judiciousness 发表于 2025-3-26 23:50:12
Future Work,ues. In the following two sections, we will first briefly revisit the open technical issues that have been discussed in previous chapters, and then ask questions from a broader view of the Revere system.Ligneous 发表于 2025-3-27 03:58:19
http://reply.papertrans.cn/29/2817/281620/281620_32.png绑架 发表于 2025-3-27 05:17:53
Introduction,ion efforts. Writers of malicious code, such as viruses, worms, and Trojan horses have been creative in finding ways for their code to propagate rapidly from machine to machine, but defenders of the Internet have been much less aggressive in finding ways to disseminate the information necessary to cFibrillation 发表于 2025-3-27 12:34:19
Assurance Via Redundancy,nces, including the case where an attacker is trying to corrupt information while in transit. In this chapter we justify the fundamental concept of information assurance via redundancy and discuss general considerations on using redundancy to secure transmissions; we will thus establish that a redunCanvas 发表于 2025-3-27 16:25:43
http://reply.papertrans.cn/29/2817/281620/281620_35.png使人烦燥 发表于 2025-3-27 19:29:47
Dissemination Procedure,update via an RBone to all connected nodes. Using pulling, an individual Revere node can request security updates. Pushing is the main delivery method. Pulling, on the other hand, allows a node to catch up with any missed security updates.sorbitol 发表于 2025-3-27 23:44:08
Security,at no Revere nodes have been subverted. Revere, as a service for delivering security information, can be a very tempting target for attackers. If attackers can misuse or abuse Revere, they can achieve various malicious goals; for example, a corrupted Revere system may become an ideal carrier to help哺乳动物 发表于 2025-3-28 05:32:25
Related Work,se general-purpose distribution services, including preliminary techniques (unicasting, broadcasting, flooding, etc.), IP multicasting, application-layer protocols, email, replicated data management, content-delivery networks, and some commercial products.narcissism 发表于 2025-3-28 08:28:46
Future Work,ues. In the following two sections, we will first briefly revisit the open technical issues that have been discussed in previous chapters, and then ask questions from a broader view of the Revere system.Aggressive 发表于 2025-3-28 11:44:21
Conclusions,out employing huge server farms. To summarize the work, in this chapter we will recapitulate the problem Revere tries to solve, summarize the solution Revere provides, and outline Revere’s contributions. Broad lessons learned from this work will also be presented.