Research on Network Architecture with Trustworthiness and Controllability

In this paper, the architecture of trustworthy and controllable networks is discussed to meet arising application requirements. After reviewing the lessons and experiences of success and failure in the Internet and summarizing related work, we analyze the basic targets of providing trustworthiness a...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Journal of computer science and technology 2006-09, Vol.21 (5), p.732-739
Hauptverfasser: Lin, Chuang, Peng, Xue-Hai
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 739
container_issue 5
container_start_page 732
container_title Journal of computer science and technology
container_volume 21
creator Lin, Chuang
Peng, Xue-Hai
description In this paper, the architecture of trustworthy and controllable networks is discussed to meet arising application requirements. After reviewing the lessons and experiences of success and failure in the Internet and summarizing related work, we analyze the basic targets of providing trustworthiness and controllability. Then, the anticipant architecture is introduced. Based on the resulting design, several trustworthy and controllable mechanisms are also discussed.
doi_str_mv 10.1007/s11390-006-0732-2
format Article
fullrecord <record><control><sourceid>wanfang_jour_proqu</sourceid><recordid>TN_cdi_wanfang_journals_jsjkxjsxb_e200605011</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><wanfj_id>jsjkxjsxb_e200605011</wanfj_id><sourcerecordid>jsjkxjsxb_e200605011</sourcerecordid><originalsourceid>FETCH-LOGICAL-c293t-36d004ee09d8e2415270fb6238ff3b197f2e5bef5eca71806461e67b1d7ec6dc3</originalsourceid><addsrcrecordid>eNpdUctOwzAQtBBIlMIHcIu4cCGwthM7PlYVj0oIJFTOVh4bmjR1iu2o7d_jqIgDl31oR7OjGUKuKdxTAPngKOUKYgARg-QsZidkQjMBcSITdRpmAIhVKOfkwrkWgEtIkglZfKDD3JarqDfRG_pdb9fRLOyNx9IPFqNd41fR0g5uvPlVY9C5KDdVNO-Nt33X5UXTNf5wSc7qvHN49dun5PPpcTl_iV_fnxfz2WtcMsV9zEUFkCCCqjJkCU2ZhLoQjGd1zQuqZM0wLbBOscwlzUAkgqKQBa0klqIq-ZTcHXl3ualz86XbfrAmfNSta9f71u0LjSwYASkEU6bk9gjf2v57QOf1pnElBtkG-8FpBVJJJRIZkDf_kH_MWUZZGuSPdPQIKm3vnMVab22zye1BU9BjEvqYhA4C9JiEZvwHWCt76A</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>881252931</pqid></control><display><type>article</type><title>Research on Network Architecture with Trustworthiness and Controllability</title><source>SpringerNature Journals</source><source>Alma/SFX Local Collection</source><creator>Lin, Chuang ; Peng, Xue-Hai</creator><creatorcontrib>Lin, Chuang ; Peng, Xue-Hai</creatorcontrib><description>In this paper, the architecture of trustworthy and controllable networks is discussed to meet arising application requirements. After reviewing the lessons and experiences of success and failure in the Internet and summarizing related work, we analyze the basic targets of providing trustworthiness and controllability. Then, the anticipant architecture is introduced. Based on the resulting design, several trustworthy and controllable mechanisms are also discussed.</description><identifier>ISSN: 1000-9000</identifier><identifier>EISSN: 1860-4749</identifier><identifier>DOI: 10.1007/s11390-006-0732-2</identifier><language>eng</language><publisher>Beijing: Springer Nature B.V</publisher><subject>Architecture ; Computer architecture ; Controllability ; Failure ; Internet ; Networks ; Reviewing ; Stability ; Trustworthiness</subject><ispartof>Journal of computer science and technology, 2006-09, Vol.21 (5), p.732-739</ispartof><rights>Springer Science + Business Media, Inc. 2006.</rights><rights>Copyright © Wanfang Data Co. Ltd. All Rights Reserved.</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><cites>FETCH-LOGICAL-c293t-36d004ee09d8e2415270fb6238ff3b197f2e5bef5eca71806461e67b1d7ec6dc3</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Uhttp://www.wanfangdata.com.cn/images/PeriodicalImages/jsjkxjsxb-e/jsjkxjsxb-e.jpg</thumbnail><link.rule.ids>315,781,785,27929,27930</link.rule.ids></links><search><creatorcontrib>Lin, Chuang</creatorcontrib><creatorcontrib>Peng, Xue-Hai</creatorcontrib><title>Research on Network Architecture with Trustworthiness and Controllability</title><title>Journal of computer science and technology</title><description>In this paper, the architecture of trustworthy and controllable networks is discussed to meet arising application requirements. After reviewing the lessons and experiences of success and failure in the Internet and summarizing related work, we analyze the basic targets of providing trustworthiness and controllability. Then, the anticipant architecture is introduced. Based on the resulting design, several trustworthy and controllable mechanisms are also discussed.</description><subject>Architecture</subject><subject>Computer architecture</subject><subject>Controllability</subject><subject>Failure</subject><subject>Internet</subject><subject>Networks</subject><subject>Reviewing</subject><subject>Stability</subject><subject>Trustworthiness</subject><issn>1000-9000</issn><issn>1860-4749</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2006</creationdate><recordtype>article</recordtype><sourceid>ABUWG</sourceid><sourceid>AFKRA</sourceid><sourceid>AZQEC</sourceid><sourceid>BENPR</sourceid><sourceid>CCPQU</sourceid><sourceid>DWQXO</sourceid><sourceid>GNUQQ</sourceid><recordid>eNpdUctOwzAQtBBIlMIHcIu4cCGwthM7PlYVj0oIJFTOVh4bmjR1iu2o7d_jqIgDl31oR7OjGUKuKdxTAPngKOUKYgARg-QsZidkQjMBcSITdRpmAIhVKOfkwrkWgEtIkglZfKDD3JarqDfRG_pdb9fRLOyNx9IPFqNd41fR0g5uvPlVY9C5KDdVNO-Nt33X5UXTNf5wSc7qvHN49dun5PPpcTl_iV_fnxfz2WtcMsV9zEUFkCCCqjJkCU2ZhLoQjGd1zQuqZM0wLbBOscwlzUAkgqKQBa0klqIq-ZTcHXl3ualz86XbfrAmfNSta9f71u0LjSwYASkEU6bk9gjf2v57QOf1pnElBtkG-8FpBVJJJRIZkDf_kH_MWUZZGuSPdPQIKm3vnMVab22zye1BU9BjEvqYhA4C9JiEZvwHWCt76A</recordid><startdate>20060901</startdate><enddate>20060901</enddate><creator>Lin, Chuang</creator><creator>Peng, Xue-Hai</creator><general>Springer Nature B.V</general><general>Department of Computer Science and Technology, Tsinghua University, Beijing 100084, P.R. China</general><scope>AAYXX</scope><scope>CITATION</scope><scope>3V.</scope><scope>7SC</scope><scope>7WY</scope><scope>7WZ</scope><scope>7XB</scope><scope>87Z</scope><scope>8AL</scope><scope>8FD</scope><scope>8FE</scope><scope>8FG</scope><scope>8FK</scope><scope>8FL</scope><scope>ABJCF</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BEZIV</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>FRNLG</scope><scope>F~G</scope><scope>GNUQQ</scope><scope>HCIFZ</scope><scope>JQ2</scope><scope>K60</scope><scope>K6~</scope><scope>K7-</scope><scope>L.-</scope><scope>L6V</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>M0C</scope><scope>M0N</scope><scope>M7S</scope><scope>P5Z</scope><scope>P62</scope><scope>PQBIZ</scope><scope>PQBZA</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PTHSS</scope><scope>Q9U</scope><scope>2B.</scope><scope>4A8</scope><scope>92I</scope><scope>93N</scope><scope>PSX</scope><scope>TCJ</scope></search><sort><creationdate>20060901</creationdate><title>Research on Network Architecture with Trustworthiness and Controllability</title><author>Lin, Chuang ; Peng, Xue-Hai</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c293t-36d004ee09d8e2415270fb6238ff3b197f2e5bef5eca71806461e67b1d7ec6dc3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2006</creationdate><topic>Architecture</topic><topic>Computer architecture</topic><topic>Controllability</topic><topic>Failure</topic><topic>Internet</topic><topic>Networks</topic><topic>Reviewing</topic><topic>Stability</topic><topic>Trustworthiness</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Lin, Chuang</creatorcontrib><creatorcontrib>Peng, Xue-Hai</creatorcontrib><collection>CrossRef</collection><collection>ProQuest Central (Corporate)</collection><collection>Computer and Information Systems Abstracts</collection><collection>Access via ABI/INFORM (ProQuest)</collection><collection>ABI/INFORM Global (PDF only)</collection><collection>ProQuest Central (purchase pre-March 2016)</collection><collection>ABI/INFORM Global (Alumni Edition)</collection><collection>Computing Database (Alumni Edition)</collection><collection>Technology Research Database</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Central (Alumni) (purchase pre-March 2016)</collection><collection>ABI/INFORM Collection (Alumni Edition)</collection><collection>Materials Science &amp; Engineering Collection</collection><collection>ProQuest Central (Alumni Edition)</collection><collection>ProQuest Central UK/Ireland</collection><collection>Advanced Technologies &amp; Aerospace Collection</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Business Premium Collection</collection><collection>Technology Collection (ProQuest)</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central Korea</collection><collection>Business Premium Collection (Alumni)</collection><collection>ABI/INFORM Global (Corporate)</collection><collection>ProQuest Central Student</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Computer Science Collection</collection><collection>ProQuest Business Collection (Alumni Edition)</collection><collection>ProQuest Business Collection</collection><collection>Computer Science Database</collection><collection>ABI/INFORM Professional Advanced</collection><collection>ProQuest Engineering Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>ABI/INFORM Global</collection><collection>Computing Database</collection><collection>Engineering Database</collection><collection>Advanced Technologies &amp; Aerospace Database</collection><collection>ProQuest Advanced Technologies &amp; Aerospace Collection</collection><collection>ProQuest One Business</collection><collection>ProQuest One Business (Alumni)</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>Engineering Collection</collection><collection>ProQuest Central Basic</collection><collection>Wanfang Data Journals - Hong Kong</collection><collection>WANFANG Data Centre</collection><collection>Wanfang Data Journals</collection><collection>万方数据期刊 - 香港版</collection><collection>China Online Journals (COJ)</collection><collection>China Online Journals (COJ)</collection><jtitle>Journal of computer science and technology</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Lin, Chuang</au><au>Peng, Xue-Hai</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Research on Network Architecture with Trustworthiness and Controllability</atitle><jtitle>Journal of computer science and technology</jtitle><date>2006-09-01</date><risdate>2006</risdate><volume>21</volume><issue>5</issue><spage>732</spage><epage>739</epage><pages>732-739</pages><issn>1000-9000</issn><eissn>1860-4749</eissn><abstract>In this paper, the architecture of trustworthy and controllable networks is discussed to meet arising application requirements. After reviewing the lessons and experiences of success and failure in the Internet and summarizing related work, we analyze the basic targets of providing trustworthiness and controllability. Then, the anticipant architecture is introduced. Based on the resulting design, several trustworthy and controllable mechanisms are also discussed.</abstract><cop>Beijing</cop><pub>Springer Nature B.V</pub><doi>10.1007/s11390-006-0732-2</doi><tpages>8</tpages></addata></record>
fulltext fulltext
identifier ISSN: 1000-9000
ispartof Journal of computer science and technology, 2006-09, Vol.21 (5), p.732-739
issn 1000-9000
1860-4749
language eng
recordid cdi_wanfang_journals_jsjkxjsxb_e200605011
source SpringerNature Journals; Alma/SFX Local Collection
subjects Architecture
Computer architecture
Controllability
Failure
Internet
Networks
Reviewing
Stability
Trustworthiness
title Research on Network Architecture with Trustworthiness and Controllability
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-12T21%3A11%3A07IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-wanfang_jour_proqu&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Research%20on%20Network%20Architecture%20with%20Trustworthiness%20and%20Controllability&rft.jtitle=Journal%20of%20computer%20science%20and%20technology&rft.au=Lin,%20Chuang&rft.date=2006-09-01&rft.volume=21&rft.issue=5&rft.spage=732&rft.epage=739&rft.pages=732-739&rft.issn=1000-9000&rft.eissn=1860-4749&rft_id=info:doi/10.1007/s11390-006-0732-2&rft_dat=%3Cwanfang_jour_proqu%3Ejsjkxjsxb_e200605011%3C/wanfang_jour_proqu%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=881252931&rft_id=info:pmid/&rft_wanfj_id=jsjkxjsxb_e200605011&rfr_iscdi=true