Journal on Communications ›› 2013, Vol. 34 ›› Issue (3): 32-43.doi: 10.3969/j.issn.1000-436x.2013.03.005

• academic paper • Previous Articles     Next Articles

Trustworthy component model supporting networks reconfiguration

Bo YUAN1,Bin-qiang WANG1,Dong-chao MA2   

  1. 1 National Digital Switching System Engineering & Techno y Center,Zhengzhou 450002,China
    2 College of Information Engineering, North China University of Technology,Beijing 100041, China
  • Online:2013-03-25 Published:2017-07-20
  • Supported by:
    The National High Technology Research and Development of China (863 Program);The National High Technology Research and Development of China (863 Program);The National Basic Research Program of China (973 Program)

Abstract:

Based on principles of the separation of concerns and the dynamic software architecture (DSA) technology, a component model named TCM(trustworthy component model)was proposed. Formation and assemblage of components were analyzed, then a trustworthy data security sealing mechanism was proposed. By sealed the data, the TCM not only support reconfiguring components, but also prevent component hostility operation, which can destroy the data transmis-sion. A container prototype was implemented, and experimental applications were implemented to validate this approach. The results show that this model can change the topology of components and find out the hostility components, which improve the trustworthy of reconfigurable flexible network node.

Key words: reconfigurable flexible networks, trustworthy, component model, security sealing; reconfiguration

No Suggested Reading articles found!