Research on Network Architecture with Trustworthiness and Controllability
In this paper, the architecture of trustworthy and controllable networks is discussed to meet arising application requirements. After reviewing the lessons and experiences of success and failure in the Internet and summarizing related work, we analyze the basic targets of providing trustworthiness a...
Gespeichert in:
Veröffentlicht in: | Journal of computer science and technology 2006-09, Vol.21 (5), p.732-739 |
---|---|
Hauptverfasser: | , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 739 |
---|---|
container_issue | 5 |
container_start_page | 732 |
container_title | Journal of computer science and technology |
container_volume | 21 |
creator | Lin, Chuang Peng, Xue-Hai |
description | In this paper, the architecture of trustworthy and controllable networks is discussed to meet arising application requirements. After reviewing the lessons and experiences of success and failure in the Internet and summarizing related work, we analyze the basic targets of providing trustworthiness and controllability. Then, the anticipant architecture is introduced. Based on the resulting design, several trustworthy and controllable mechanisms are also discussed. |
doi_str_mv | 10.1007/s11390-006-0732-2 |
format | Article |
fullrecord | <record><control><sourceid>wanfang_jour_proqu</sourceid><recordid>TN_cdi_wanfang_journals_jsjkxjsxb_e200605011</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><wanfj_id>jsjkxjsxb_e200605011</wanfj_id><sourcerecordid>jsjkxjsxb_e200605011</sourcerecordid><originalsourceid>FETCH-LOGICAL-c293t-36d004ee09d8e2415270fb6238ff3b197f2e5bef5eca71806461e67b1d7ec6dc3</originalsourceid><addsrcrecordid>eNpdUctOwzAQtBBIlMIHcIu4cCGwthM7PlYVj0oIJFTOVh4bmjR1iu2o7d_jqIgDl31oR7OjGUKuKdxTAPngKOUKYgARg-QsZidkQjMBcSITdRpmAIhVKOfkwrkWgEtIkglZfKDD3JarqDfRG_pdb9fRLOyNx9IPFqNd41fR0g5uvPlVY9C5KDdVNO-Nt33X5UXTNf5wSc7qvHN49dun5PPpcTl_iV_fnxfz2WtcMsV9zEUFkCCCqjJkCU2ZhLoQjGd1zQuqZM0wLbBOscwlzUAkgqKQBa0klqIq-ZTcHXl3ualz86XbfrAmfNSta9f71u0LjSwYASkEU6bk9gjf2v57QOf1pnElBtkG-8FpBVJJJRIZkDf_kH_MWUZZGuSPdPQIKm3vnMVab22zye1BU9BjEvqYhA4C9JiEZvwHWCt76A</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>881252931</pqid></control><display><type>article</type><title>Research on Network Architecture with Trustworthiness and Controllability</title><source>SpringerNature Journals</source><source>Alma/SFX Local Collection</source><creator>Lin, Chuang ; Peng, Xue-Hai</creator><creatorcontrib>Lin, Chuang ; Peng, Xue-Hai</creatorcontrib><description>In this paper, the architecture of trustworthy and controllable networks is discussed to meet arising application requirements. After reviewing the lessons and experiences of success and failure in the Internet and summarizing related work, we analyze the basic targets of providing trustworthiness and controllability. Then, the anticipant architecture is introduced. Based on the resulting design, several trustworthy and controllable mechanisms are also discussed.</description><identifier>ISSN: 1000-9000</identifier><identifier>EISSN: 1860-4749</identifier><identifier>DOI: 10.1007/s11390-006-0732-2</identifier><language>eng</language><publisher>Beijing: Springer Nature B.V</publisher><subject>Architecture ; Computer architecture ; Controllability ; Failure ; Internet ; Networks ; Reviewing ; Stability ; Trustworthiness</subject><ispartof>Journal of computer science and technology, 2006-09, Vol.21 (5), p.732-739</ispartof><rights>Springer Science + Business Media, Inc. 2006.</rights><rights>Copyright © Wanfang Data Co. Ltd. All Rights Reserved.</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><cites>FETCH-LOGICAL-c293t-36d004ee09d8e2415270fb6238ff3b197f2e5bef5eca71806461e67b1d7ec6dc3</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Uhttp://www.wanfangdata.com.cn/images/PeriodicalImages/jsjkxjsxb-e/jsjkxjsxb-e.jpg</thumbnail><link.rule.ids>315,781,785,27929,27930</link.rule.ids></links><search><creatorcontrib>Lin, Chuang</creatorcontrib><creatorcontrib>Peng, Xue-Hai</creatorcontrib><title>Research on Network Architecture with Trustworthiness and Controllability</title><title>Journal of computer science and technology</title><description>In this paper, the architecture of trustworthy and controllable networks is discussed to meet arising application requirements. After reviewing the lessons and experiences of success and failure in the Internet and summarizing related work, we analyze the basic targets of providing trustworthiness and controllability. Then, the anticipant architecture is introduced. Based on the resulting design, several trustworthy and controllable mechanisms are also discussed.</description><subject>Architecture</subject><subject>Computer architecture</subject><subject>Controllability</subject><subject>Failure</subject><subject>Internet</subject><subject>Networks</subject><subject>Reviewing</subject><subject>Stability</subject><subject>Trustworthiness</subject><issn>1000-9000</issn><issn>1860-4749</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2006</creationdate><recordtype>article</recordtype><sourceid>ABUWG</sourceid><sourceid>AFKRA</sourceid><sourceid>AZQEC</sourceid><sourceid>BENPR</sourceid><sourceid>CCPQU</sourceid><sourceid>DWQXO</sourceid><sourceid>GNUQQ</sourceid><recordid>eNpdUctOwzAQtBBIlMIHcIu4cCGwthM7PlYVj0oIJFTOVh4bmjR1iu2o7d_jqIgDl31oR7OjGUKuKdxTAPngKOUKYgARg-QsZidkQjMBcSITdRpmAIhVKOfkwrkWgEtIkglZfKDD3JarqDfRG_pdb9fRLOyNx9IPFqNd41fR0g5uvPlVY9C5KDdVNO-Nt33X5UXTNf5wSc7qvHN49dun5PPpcTl_iV_fnxfz2WtcMsV9zEUFkCCCqjJkCU2ZhLoQjGd1zQuqZM0wLbBOscwlzUAkgqKQBa0klqIq-ZTcHXl3ualz86XbfrAmfNSta9f71u0LjSwYASkEU6bk9gjf2v57QOf1pnElBtkG-8FpBVJJJRIZkDf_kH_MWUZZGuSPdPQIKm3vnMVab22zye1BU9BjEvqYhA4C9JiEZvwHWCt76A</recordid><startdate>20060901</startdate><enddate>20060901</enddate><creator>Lin, Chuang</creator><creator>Peng, Xue-Hai</creator><general>Springer Nature B.V</general><general>Department of Computer Science and Technology, Tsinghua University, Beijing 100084, P.R. China</general><scope>AAYXX</scope><scope>CITATION</scope><scope>3V.</scope><scope>7SC</scope><scope>7WY</scope><scope>7WZ</scope><scope>7XB</scope><scope>87Z</scope><scope>8AL</scope><scope>8FD</scope><scope>8FE</scope><scope>8FG</scope><scope>8FK</scope><scope>8FL</scope><scope>ABJCF</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BEZIV</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>FRNLG</scope><scope>F~G</scope><scope>GNUQQ</scope><scope>HCIFZ</scope><scope>JQ2</scope><scope>K60</scope><scope>K6~</scope><scope>K7-</scope><scope>L.-</scope><scope>L6V</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>M0C</scope><scope>M0N</scope><scope>M7S</scope><scope>P5Z</scope><scope>P62</scope><scope>PQBIZ</scope><scope>PQBZA</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PTHSS</scope><scope>Q9U</scope><scope>2B.</scope><scope>4A8</scope><scope>92I</scope><scope>93N</scope><scope>PSX</scope><scope>TCJ</scope></search><sort><creationdate>20060901</creationdate><title>Research on Network Architecture with Trustworthiness and Controllability</title><author>Lin, Chuang ; Peng, Xue-Hai</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c293t-36d004ee09d8e2415270fb6238ff3b197f2e5bef5eca71806461e67b1d7ec6dc3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2006</creationdate><topic>Architecture</topic><topic>Computer architecture</topic><topic>Controllability</topic><topic>Failure</topic><topic>Internet</topic><topic>Networks</topic><topic>Reviewing</topic><topic>Stability</topic><topic>Trustworthiness</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Lin, Chuang</creatorcontrib><creatorcontrib>Peng, Xue-Hai</creatorcontrib><collection>CrossRef</collection><collection>ProQuest Central (Corporate)</collection><collection>Computer and Information Systems Abstracts</collection><collection>Access via ABI/INFORM (ProQuest)</collection><collection>ABI/INFORM Global (PDF only)</collection><collection>ProQuest Central (purchase pre-March 2016)</collection><collection>ABI/INFORM Global (Alumni Edition)</collection><collection>Computing Database (Alumni Edition)</collection><collection>Technology Research Database</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Central (Alumni) (purchase pre-March 2016)</collection><collection>ABI/INFORM Collection (Alumni Edition)</collection><collection>Materials Science & Engineering Collection</collection><collection>ProQuest Central (Alumni Edition)</collection><collection>ProQuest Central UK/Ireland</collection><collection>Advanced Technologies & Aerospace Collection</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Business Premium Collection</collection><collection>Technology Collection (ProQuest)</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central Korea</collection><collection>Business Premium Collection (Alumni)</collection><collection>ABI/INFORM Global (Corporate)</collection><collection>ProQuest Central Student</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Computer Science Collection</collection><collection>ProQuest Business Collection (Alumni Edition)</collection><collection>ProQuest Business Collection</collection><collection>Computer Science Database</collection><collection>ABI/INFORM Professional Advanced</collection><collection>ProQuest Engineering Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>ABI/INFORM Global</collection><collection>Computing Database</collection><collection>Engineering Database</collection><collection>Advanced Technologies & Aerospace Database</collection><collection>ProQuest Advanced Technologies & Aerospace Collection</collection><collection>ProQuest One Business</collection><collection>ProQuest One Business (Alumni)</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>Engineering Collection</collection><collection>ProQuest Central Basic</collection><collection>Wanfang Data Journals - Hong Kong</collection><collection>WANFANG Data Centre</collection><collection>Wanfang Data Journals</collection><collection>万方数据期刊 - 香港版</collection><collection>China Online Journals (COJ)</collection><collection>China Online Journals (COJ)</collection><jtitle>Journal of computer science and technology</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Lin, Chuang</au><au>Peng, Xue-Hai</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Research on Network Architecture with Trustworthiness and Controllability</atitle><jtitle>Journal of computer science and technology</jtitle><date>2006-09-01</date><risdate>2006</risdate><volume>21</volume><issue>5</issue><spage>732</spage><epage>739</epage><pages>732-739</pages><issn>1000-9000</issn><eissn>1860-4749</eissn><abstract>In this paper, the architecture of trustworthy and controllable networks is discussed to meet arising application requirements. After reviewing the lessons and experiences of success and failure in the Internet and summarizing related work, we analyze the basic targets of providing trustworthiness and controllability. Then, the anticipant architecture is introduced. Based on the resulting design, several trustworthy and controllable mechanisms are also discussed.</abstract><cop>Beijing</cop><pub>Springer Nature B.V</pub><doi>10.1007/s11390-006-0732-2</doi><tpages>8</tpages></addata></record> |
fulltext | fulltext |
identifier | ISSN: 1000-9000 |
ispartof | Journal of computer science and technology, 2006-09, Vol.21 (5), p.732-739 |
issn | 1000-9000 1860-4749 |
language | eng |
recordid | cdi_wanfang_journals_jsjkxjsxb_e200605011 |
source | SpringerNature Journals; Alma/SFX Local Collection |
subjects | Architecture Computer architecture Controllability Failure Internet Networks Reviewing Stability Trustworthiness |
title | Research on Network Architecture with Trustworthiness and Controllability |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-12T21%3A11%3A07IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-wanfang_jour_proqu&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Research%20on%20Network%20Architecture%20with%20Trustworthiness%20and%20Controllability&rft.jtitle=Journal%20of%20computer%20science%20and%20technology&rft.au=Lin,%20Chuang&rft.date=2006-09-01&rft.volume=21&rft.issue=5&rft.spage=732&rft.epage=739&rft.pages=732-739&rft.issn=1000-9000&rft.eissn=1860-4749&rft_id=info:doi/10.1007/s11390-006-0732-2&rft_dat=%3Cwanfang_jour_proqu%3Ejsjkxjsxb_e200605011%3C/wanfang_jour_proqu%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=881252931&rft_id=info:pmid/&rft_wanfj_id=jsjkxjsxb_e200605011&rfr_iscdi=true |