作者: Howard Shrobe , Jon Doyle , None
关键词: Intrusion detection system 、 Trust management (information system) 、 Resource (project management) 、 Software system 、 Engineering 、 Adaptation (computer science) 、 Rational planning model 、 Trusted computing base 、 Computer security 、 Computational resource
摘要: The traditional approaches to building survivable systems assume a framework of absolute trust requiring provably impenetrable and incorruptible Trusted Computing Base (TCB). Unfortunately, we don’t have TCB’s, experience suggests that never will. We must instead concentrate on software can provide useful services even when computational resource are compromised. Such system will 1) Estimate the degree which resources may be trusted using models possible compromises. 2) Recognize is compromised by relying for long term monitoring analysis infrastructure. 3) Engage in self-monitoring, diagnosis adaptation best achieve its purposes within available All this, turn, depends ability application, monitoring, control engage rational decision making about what they should use order ratio expected benefit risk.