Design and Research of Computer System High Confidence Fault Tolerant

Article Preview

Abstract:

For high security and reliability of system critical areas, this paper designed a high-confidence fault-tolerant computer system, which combined high credibility technology with high organic reliability integration. High trusted computing technology used TCM structure to build a trusted password support system and achieve the platform integrity, identity authentication and data security. Redundant fault-tolerant technology to ensure the system, which activated in case of an error, is still able to provide uninterrupted service. Simulation results show the effectiveness and implementation of the technical solution approaches.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

3361-3364

Citation:

Online since:

September 2014

Authors:

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] Liu C L, Layland J W. Scheduling Algorithms for Multipro-gramming in a Hard-real-time Environment [J]. Journal of the ACM, 1973, 20(1): 46-61.

DOI: 10.1145/321738.321743

Google Scholar

[2] Chekuri C, Sungjin I, Moseley B. Minimizing MaximumResponse Time and Delay Factor in Broadcasting Scheduling[C]/Proc. Of the 17th Annual European Symposium on Algorithms. Copenhagen, Denmark: [s. n. ], (2009).

Google Scholar

[3] Greensmith J. The Dendritic Cell Algorithm [D]. Nottingham, UK: University of Nottingham, (2007).

Google Scholar

[4] Twycross J. Immune Systems, Danger Theory and Intrusion Detection[C]/Proc. of the AISB Symposium on ImmuneSystems and Cognition. Leeds, UK: [s. n. ], 2004: 40-42.

Google Scholar

[5] Greensmith J, Aickelin U. Articulation and Clarification of the Dendritic Cell Algorithm[C]/Proc. of the 5th International Conference on Artificial Immune Systems. Lisbon, Portugal: [s. n. ], 2006: 404-417.

DOI: 10.1007/11823940_31

Google Scholar

[6] Li Hao, Hu Hao. UCFS: Building a Usage Controlled File System with a Trusted Platform Module[C]/Proc. of the 1st Chinese Conf. on Trust Computing Theory and Parctice. Beijing, China: Tsinghua University Press, 2009: 10-23.

Google Scholar