Abstract
The credibility of the proposal and development process of the network and how it works, in the traditional network model, based on credible combination of life sciences to the behavioral characteristics of the data contained in the main line, build a credible model of network theory, in this proposed based on a credible fix the overall network design and a detailed discussion of the trusted network repair services technology, given the credibility of the model repair and restoration of network services, work flow, provide a credible rehabilitation program. Resources in ensuring the restoration of the program transmission of fast, reliable based on the performance with a certain extension.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Meifeng S, Jian G (2004) The research of formal specification of intrusion detection rules. In: Proceedings-conference on local computer networks, vol 25(15). LCN, Tampa, pp 429–430
Harn L, Hsin WJ, Mehta M (2005) Authenticated Diffic-Hellman key agreement protocol using a single cryptographic assumption. IEEE Proc Commu 12(10):404–410
Beth T, Borcherding M, Klein B (1994) Valuation of trust in open network. In: Gollmann D (ed) Proceedings of the European Symposium on research in security, vol 7(2). Springer, Brighton, pp 3–18
Suganuma T, Yasue T, Kawahito M, Komatsu H, Nakatani T (2005) Design and evaluation of dynamic optimizations for a java just-in-time compiler. ACM Trans Program Lang Syst 27(15):732–785
Acknowledgments
This work is partially supported by Shaanxi Provincial Science and Technology Department: Computer Software and Security Technology (2009JM8003).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer-Verlag London
About this paper
Cite this paper
Xu, Q. (2013). Trusted Network Model and Repair. In: Zhong, Z. (eds) Proceedings of the International Conference on Information Engineering and Applications (IEA) 2012. Lecture Notes in Electrical Engineering, vol 220. Springer, London. https://doi.org/10.1007/978-1-4471-4844-9_32
Download citation
DOI: https://doi.org/10.1007/978-1-4471-4844-9_32
Published:
Publisher Name: Springer, London
Print ISBN: 978-1-4471-4843-2
Online ISBN: 978-1-4471-4844-9
eBook Packages: EngineeringEngineering (R0)