Information security underlying transparent computing: Impacts, visions and challenges

Yaoxue Zhang, L. Yang, Yuezhi Zhou, Wenyuan Kuang
{"title":"Information security underlying transparent computing: Impacts, visions and challenges","authors":"Yaoxue Zhang, L. Yang, Yuezhi Zhou, Wenyuan Kuang","doi":"10.3233/WIA-2010-0187","DOIUrl":null,"url":null,"abstract":"The rapid development of computer network technologies and social informationalization has brought many new opportunities and challenges in information security. With improved information and service sharing enjoyed by more and more people, how to strengthen the information security has become an increasingly critical issue. In this paper, we propose a new network security mechanism based on a novel computing paradigm, i.e., transparent computing, which is based on the extended von Neumann architecture. This paradigm separates the program storage and execution, which is implemented in the network environment. It is realized by a new generation server and client BIOS, namely EFI BIOS, and coordinated with the MetaOS management platform and related switching and input/ouput devices of transparent computing. Through the interface between hardware and software, it conducts effective control, monitoring and management of data and instructions in a block-streaming way for the operating system and the application programs above it. At the same time, it adopts a security protection mechanism to prevent and remove prevalent malicious software such as worm and Trojan horse. Several demonstrated examples are described in detail to illustrate the attractive and promising security features and advantages.","PeriodicalId":263450,"journal":{"name":"Web Intell. Agent Syst.","volume":"21 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2010-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"19","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Web Intell. Agent Syst.","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.3233/WIA-2010-0187","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 19

Abstract

The rapid development of computer network technologies and social informationalization has brought many new opportunities and challenges in information security. With improved information and service sharing enjoyed by more and more people, how to strengthen the information security has become an increasingly critical issue. In this paper, we propose a new network security mechanism based on a novel computing paradigm, i.e., transparent computing, which is based on the extended von Neumann architecture. This paradigm separates the program storage and execution, which is implemented in the network environment. It is realized by a new generation server and client BIOS, namely EFI BIOS, and coordinated with the MetaOS management platform and related switching and input/ouput devices of transparent computing. Through the interface between hardware and software, it conducts effective control, monitoring and management of data and instructions in a block-streaming way for the operating system and the application programs above it. At the same time, it adopts a security protection mechanism to prevent and remove prevalent malicious software such as worm and Trojan horse. Several demonstrated examples are described in detail to illustrate the attractive and promising security features and advantages.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
透明计算背后的信息安全:影响、愿景和挑战
计算机网络技术和社会信息化的飞速发展,给信息安全带来了许多新的机遇和挑战。随着越来越多的人享受到信息和服务的共享,如何加强信息安全已成为一个日益重要的问题。在本文中,我们提出了一种新的网络安全机制,基于一种新的计算范式,即透明计算,它是基于扩展的冯·诺伊曼架构。这种范例将程序的存储和执行分离开来,在网络环境中实现。它由新一代服务器和客户端BIOS即EFI BIOS实现,并与MetaOS管理平台以及相关的透明计算开关和输入/输出设备相协调。它通过硬件和软件之间的接口,以块流的方式对操作系统及其上面的应用程序进行数据和指令的有效控制、监控和管理。同时采用安全防护机制,防止和清除蠕虫、木马等流行的恶意软件。详细描述了几个演示示例,以说明有吸引力和有前途的安全特性和优势。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Detecting cyberbullying in social networks using multi-agent system Scalable approximating SVD algorithm for recommender systems Web usage mining based recommender systems using implicit heterogeneous data: - A Particle Swarm Optimization based clustering approach Agent-based problem solving methods in Big Data environment Multi-agent orienteering problem with time-dependent capacity constraints
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1