Font Size: a A A

Research Of Intrusion Tolerance Technology And Implementation Of An Intrusion Tolerated CA System

Posted on:2006-07-29Degree:MasterType:Thesis
Country:ChinaCandidate:Q ZhaoFull Text:PDF
GTID:2178360182960503Subject:Military Equipment
Abstract/Summary:PDF Full Text Request
Intrusion Tolerance technology is a new network security.Based on the civil and abroad research result, this paper proposed a intrusion tolerated digital signature scheme and implementated a intrusion tolerated CA system. Then this paper built a usability evaluation model of intrusion tolerated system, through the model this paper evaluated the usability of the intrusion tolerated digital signature scheme and the intrusion tolerated CA system.In detail, the work of this paper mostly is:1. Introduced the research background and basic concept of intrusion tolerated technique, introduced the civil and abroad research result from the four aspects: intrusion tolerated system's model and framework design, intrtusion tolerated system's design, intrusion toleration's basic theories and intrusion tolerated system's formal describe and analysis.2. Using Zero-knowledge provement method and Feldman's VSS, designed a intrusion tolerated digital signature scheme with preferable effect and proved the Zero-knowledge method used in the scheme.3. Designed and implementated an intrusion toleranted CA system based on the intrusion tolerated digital signature scheme.4. Built a usability evaluation model of intrusion tolerated system, and through the model this paper evaluated the usability of the intrusion tolerated digital signature scheme and the intrusion tolerated CA system.
Keywords/Search Tags:Intrusion Tolerance, Zero-knowledge provement, Secret Sharing, Threshold Signature, CA (certificate authority), evaluation model
PDF Full Text Request
Related items