Skip to main content

2014 | OriginalPaper | Buchkapitel

5. Trusted Computation Through Biologically Inspired Processes

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

In today’s computing environments, one must assume that a subset of the system is currently, or will eventually be compromised. The proposed architecture supports design separation for high reliability and information assurance. By leveraging a hybrid fault model with multiple, parallel execution paths and resultant execution trace comparison, the proposed cognitive trust architecture identifies suspect nodes and assures trusted execution. Furthermore, the modeled architecture may be scaled through proactive thread diversity for additional assurance during threat escalation. The solution provides dynamic protection through distributing critical information across federated cloud resources that adopt a metamorphic topology, redundant execution, and the ability to break command and control of malicious agents.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Lammel, R., “Googles MapReduce programming model Revisited,” Science of Computer Programming 70(1), 1–30 (2008).MathSciNetCrossRef Lammel, R., “Googles MapReduce programming model Revisited,” Science of Computer Programming 70(1), 1–30 (2008).MathSciNetCrossRef
2.
Zurück zum Zitat Gollman, D., [Computer Security], John Wiley & Sons (2011). Gollman, D., [Computer Security], John Wiley & Sons (2011).
3.
Zurück zum Zitat Saltzer, J. H. and Schroeder, M. D., “The protection of information in computer systems,” Proceedings of the IEEE 63(9), 1278–1308 (1975).CrossRef Saltzer, J. H. and Schroeder, M. D., “The protection of information in computer systems,” Proceedings of the IEEE 63(9), 1278–1308 (1975).CrossRef
4.
Zurück zum Zitat Han, S.-J., Oh, H.-S., and Park, J., “The improved data encryption standard (DES) algorithm,” in [Spread Spectrum Techniques and Applications Proceedings, 1996., IEEE 4th International Symposium on], 3, 1310– 1314, IEEE (1996). Han, S.-J., Oh, H.-S., and Park, J., “The improved data encryption standard (DES) algorithm,” in [Spread Spectrum Techniques and Applications Proceedings, 1996., IEEE 4th International Symposium on], 3, 1310– 1314, IEEE (1996).
5.
Zurück zum Zitat Diffie, W. and Hellman, M., “New directions in cryptography,” Information Theory, IEEE Transactions on 22(6), 644–654 (1976). Diffie, W. and Hellman, M., “New directions in cryptography,” Information Theory, IEEE Transactions on 22(6), 644–654 (1976).
6.
Zurück zum Zitat Rivest, R. L., Shamir, A., and Adleman, L., “A method for obtaining digital signatures and public-key cryptosystems,” Communications of the ACM 21(2), 120–126 (1978).MathSciNetCrossRefMATH Rivest, R. L., Shamir, A., and Adleman, L., “A method for obtaining digital signatures and public-key cryptosystems,” Communications of the ACM 21(2), 120–126 (1978).MathSciNetCrossRefMATH
7.
Zurück zum Zitat Clark, D. D. and Wilson, D. R., “A comparison of commercial and military computer security policies,” NIST SPECIAL PUBLICATION SP (1989). Clark, D. D. and Wilson, D. R., “A comparison of commercial and military computer security policies,” NIST SPECIAL PUBLICATION SP (1989).
8.
Zurück zum Zitat Brewer, D. F. and Nash, M. J., “The chinese wall security policy,” in [Security and Privacy, 1989. Proceedings., 1989 IEEE Symposium on], 206–214, IEEE (1989). Brewer, D. F. and Nash, M. J., “The chinese wall security policy,” in [Security and Privacy, 1989. Proceedings., 1989 IEEE Symposium on], 206–214, IEEE (1989).
9.
Zurück zum Zitat One, A., “Smashing the stack for fun and profit,” Phrack magazine 7(49), 14–16 (1996). One, A., “Smashing the stack for fun and profit,” Phrack magazine 7(49), 14–16 (1996).
10.
Zurück zum Zitat Eaton, J. W. et al., [GNU octave], Free Software Foundation (1997). Eaton, J. W. et al., [GNU octave], Free Software Foundation (1997).
11.
Zurück zum Zitat Wang, W., Zeng, G., Tang, D., and Yao, J., “Cloud-DLS: Dynamic trusted scheduling for Cloud computing,” Expert Systems with Applications 39(3), 2321–2329 (2012).CrossRef Wang, W., Zeng, G., Tang, D., and Yao, J., “Cloud-DLS: Dynamic trusted scheduling for Cloud computing,” Expert Systems with Applications 39(3), 2321–2329 (2012).CrossRef
12.
Zurück zum Zitat Rousseau, D. M., Sitkin, S. B., Burt, R. S., and Camerer, C., “Not so different after all: A cross-discipline view of trust.,” Academy of management review 23(3), 393–404 (1998).CrossRef Rousseau, D. M., Sitkin, S. B., Burt, R. S., and Camerer, C., “Not so different after all: A cross-discipline view of trust.,” Academy of management review 23(3), 393–404 (1998).CrossRef
13.
Zurück zum Zitat Mayer, R. C., Davis, J. H., and Schoorman, F. D., “An integrative model of organizational trust,” Academy of management review, 709–734 (1995). Mayer, R. C., Davis, J. H., and Schoorman, F. D., “An integrative model of organizational trust,” Academy of management review, 709–734 (1995).
Metadaten
Titel
Trusted Computation Through Biologically Inspired Processes
verfasst von
Gustave W. Anderson
Copyright-Jahr
2014
DOI
https://doi.org/10.1007/978-3-319-10374-7_5