Skip to main content

Trusted Computation Through Biologically Inspired Processes

  • Chapter
  • First Online:
Cybersecurity Systems for Human Cognition Augmentation

Part of the book series: Advances in Information Security ((ADIS,volume 61))

  • 1245 Accesses

Abstract

In today’s computing environments, one must assume that a subset of the system is currently, or will eventually be compromised. The proposed architecture supports design separation for high reliability and information assurance. By leveraging a hybrid fault model with multiple, parallel execution paths and resultant execution trace comparison, the proposed cognitive trust architecture identifies suspect nodes and assures trusted execution. Furthermore, the modeled architecture may be scaled through proactive thread diversity for additional assurance during threat escalation. The solution provides dynamic protection through distributing critical information across federated cloud resources that adopt a metamorphic topology, redundant execution, and the ability to break command and control of malicious agents.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Lammel, R., “Googles MapReduce programming model Revisited,” Science of Computer Programming 70(1), 1–30 (2008).

    Article  MathSciNet  Google Scholar 

  2. Gollman, D., [Computer Security], John Wiley & Sons (2011).

    Google Scholar 

  3. Saltzer, J. H. and Schroeder, M. D., “The protection of information in computer systems,” Proceedings of the IEEE 63(9), 1278–1308 (1975).

    Article  Google Scholar 

  4. Han, S.-J., Oh, H.-S., and Park, J., “The improved data encryption standard (DES) algorithm,” in [Spread Spectrum Techniques and Applications Proceedings, 1996., IEEE 4th International Symposium on], 3, 1310– 1314, IEEE (1996).

    Google Scholar 

  5. Diffie, W. and Hellman, M., “New directions in cryptography,” Information Theory, IEEE Transactions on 22(6), 644–654 (1976).

    Google Scholar 

  6. Rivest, R. L., Shamir, A., and Adleman, L., “A method for obtaining digital signatures and public-key cryptosystems,” Communications of the ACM 21(2), 120–126 (1978).

    Article  MathSciNet  MATH  Google Scholar 

  7. Clark, D. D. and Wilson, D. R., “A comparison of commercial and military computer security policies,” NIST SPECIAL PUBLICATION SP (1989).

    Google Scholar 

  8. Brewer, D. F. and Nash, M. J., “The chinese wall security policy,” in [Security and Privacy, 1989. Proceedings., 1989 IEEE Symposium on], 206–214, IEEE (1989).

    Google Scholar 

  9. One, A., “Smashing the stack for fun and profit,” Phrack magazine 7(49), 14–16 (1996).

    Google Scholar 

  10. Eaton, J. W. et al., [GNU octave], Free Software Foundation (1997).

    Google Scholar 

  11. Wang, W., Zeng, G., Tang, D., and Yao, J., “Cloud-DLS: Dynamic trusted scheduling for Cloud computing,” Expert Systems with Applications 39(3), 2321–2329 (2012).

    Article  Google Scholar 

  12. Rousseau, D. M., Sitkin, S. B., Burt, R. S., and Camerer, C., “Not so different after all: A cross-discipline view of trust.,” Academy of management review 23(3), 393–404 (1998).

    Article  Google Scholar 

  13. Mayer, R. C., Davis, J. H., and Schoorman, F. D., “An integrative model of organizational trust,” Academy of management review, 709–734 (1995).

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Gustave W. Anderson .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer International Publishing Switzerland

About this chapter

Cite this chapter

Anderson, G.W. (2014). Trusted Computation Through Biologically Inspired Processes. In: Pino, R., Kott, A., Shevenell, M. (eds) Cybersecurity Systems for Human Cognition Augmentation. Advances in Information Security, vol 61. Springer, Cham. https://doi.org/10.1007/978-3-319-10374-7_5

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-10374-7_5

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-10373-0

  • Online ISBN: 978-3-319-10374-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics