Scale and performance in a distributed file system
ACM Transactions on Computer Systems (TOCS)
Firewalls and Internet security: repelling the wily hacker
Firewalls and Internet security: repelling the wily hacker
Communications of the ACM
Network attached storage architecture
Communications of the ACM
ACM Transactions on Computer Systems (TOCS)
Biometrics, Personal Identification in Networked Society: Personal Identification in Networked Society
IEEE Internet Computing
Neural Networks for Web Content Filtering
IEEE Intelligent Systems
The distributed V kernel and its performance for diskless workstations
SOSP '83 Proceedings of the ninth ACM symposium on Operating systems principles
WMCSA '02 Proceedings of the Fourth IEEE Workshop on Mobile Computing Systems and Applications
Network Computers--Ubiquitous Computing or Dumb Multimedia?
ISADS '97 Proceedings of the 3rd International Symposium on Autonomous Decentralized Systems
MobiDesk: mobile virtual desktop computing
Proceedings of the 10th annual international conference on Mobile computing and networking
The Art of Computer Virus Research and Defense
The Art of Computer Virus Research and Defense
Reincarnating PCs with portable SoulPads
Proceedings of the 3rd international conference on Mobile systems, applications, and services
Cryptography and Network Security (4th Edition)
Cryptography and Network Security (4th Edition)
Towards a formalization of value-centric trust in agent societies
Web Intelligence and Agent Systems
The collective: a cache-based system management architecture
NSDI'05 Proceedings of the 2nd conference on Symposium on Networked Systems Design & Implementation - Volume 2
Ubisafe computing: vision and challenges (I)
ATC'06 Proceedings of the Third international conference on Autonomic and Trusted Computing
Transparent computing: a new paradigm for pervasive computing
UIC'06 Proceedings of the Third international conference on Ubiquitous Intelligence and Computing
Research challenges and perspectives on Wisdom Web of Things (W2T)
The Journal of Supercomputing
Hi-index | 0.00 |
The rapid development of computer network technologies and social informationalization has brought many new opportunities and challenges in information security. With improved information and service sharing enjoyed by more and more people, how to strengthen the information security has become an increasingly critical issue. In this paper, we propose a new network security mechanism based on a novel computing paradigm, i.e., transparent computing, which is based on the extended von Neumann architecture. This paradigm separates the program storage and execution, which is implemented in the network environment. It is realized by a new generation server and client BIOS, namely EFI BIOS, and coordinated with the MetaOS management platform and related switching and input/ouput devices of transparent computing. Through the interface between hardware and software, it conducts effective control, monitoring and management of data and instructions in a block-streaming way for the operating system and the application programs above it. At the same time, it adopts a security protection mechanism to prevent and remove prevalent malicious software such as worm and Trojan horse. Several demonstrated examples are described in detail to illustrate the attractive and promising security features and advantages.