期刊文献+

软件更新安全解决方案研究 被引量:3

Research on security solution for software update
下载PDF
导出
摘要 在分布式环境中进行软件更新存在许多安全问题,现有的更新系统都未给出一套完整的安全解决方案.根据对软件更新中安全需求的分析,在Web服务实现的更新系统中,利用XML签名、XML加密等技术实现了一个统一的安全解决方案.最后对方案中采用不同的安全技术进行了性能测试和分析,让用户可以根据自己的需求进行定制. There are many security problems in the process of software update in distributed systems.All the software update systems available don′t provide a complete security solution to these problems.According to the analysis of the security policy in the software update process,a new complete security solution is presented for the security policy.The security solution for a software update system built in Web service is implemented via the technology of XML signature,XML encryption,etc..Finally some experiments are conducted to test and analyze the performance of the different implementations which adopt different encryption algorithms,so that any one can choose the security technology in the practice according to his own requirements.
出处 《大连理工大学学报》 EI CAS CSCD 北大核心 2005年第z1期161-165,共5页 Journal of Dalian University of Technology
关键词 安全需求 安全解决方案 WEB服务 XML签名 XML加密 性能测试 security requirements security solution Web Service XML signature XML encryption performance test
  • 相关文献

参考文献9

  • 1[1]JANSEN S, BALLINTIJN G, BRINKKEMPER S. A process model and typology for software product updaters[A]. CSMR 2005 Proceedings[C]. Manchester: IEEE Computer Society Press, 2005:265-274.
  • 2[2]DEVANBU P, GERTZ M, STUBBLEBINE S. Security for automated, distributed configuration management[A]. Proceedings of the 1999 International Conference on Software Engineering[C]. Los Angeles: ACM, 1999.
  • 3[3]ADI W, AL-QAYEDI A, NEGM K. Secured mobile device software update over IP networks[A]. IEEE SoutheastCon 2004 [C] Greensboro:IEEE, 2004:271-274.
  • 4[4]HILLENBRAND M, MLLER P, MIHAJLOSKI K. A software deployment service for autonomous computing environments[A]. International Conference on Intelligent Commerce - IAWTIC 2004[C]. Australia: University of Canberra, 2004.
  • 5[5]HALL R, HEIMBIGNER D, WOLF A. A cooperative approach to support software deployment using the software dock[A]. Proceedings of the 1999 International Conference on Software Engineering[C]. Los Angeles: ACM, 1999:174-183.
  • 6[6]SCHNEINER B. 应用密码学[M]. 北京:机械工业出版社, 2000.
  • 7[7]THORSTEINSON P, GANESH G.NET安全性与密码术[M]. 北京:清华大学出版社, 2004.
  • 8[8]Web Services Enhancements 2.0 for Microsoft .NET. Documentation[S].[S.l.]:Microsoft Corporation, 2004.
  • 9[9]Web Services Security v1.0[S]. [S.l.]: OASIS, 2004.

同被引文献22

  • 1邱志聪,王飞.基于CA的安全软件分发方案[J].计算机工程与应用,2005,41(11):48-49. 被引量:3
  • 2Eimear GaUery,"Application of Trusted Computing to Secure Video Broadcasts to Mobile Receivers" [EB/OL],http://www.rhul.ac. uk/mathematics/techreports,June 2005.
  • 3TrustZone Software API Specification,http://www.arm.com/pdfs, 2005.
  • 4D. Boneh, B. Lynn, H. Shacham. Short Signatures from the Weil Pairing[J], Proc. Of Asiacrypt'01, Lecture Notes in Computer Sci- ences, Vol. 2248, Springer-Verlag, 2001,514-532.
  • 5Alvarez S, Zoller T. The death of A V defense in depth? -revisiting anti-virus software[DB/OL].[2015- 5-13]. http://cansecwest. com/ csw08/ csw08-alvarez. pdf.
  • 6Porst S. How to really obfuscate your PDF malware[DB/OL].[2015-5-13]. http://recon. cx/2010/ slides/ recon_20 1 O_sebastian_porst. pdf.
  • 7Jana S, Shmatikov V. Abusing file processing in malware detectors for fun and profit[C]/ / Security and Privacy (SP), 2012 IEEE Symposium on. Piscataway: IEEE, 2012: 80-94.
  • 8KoretJ. Breaking AV Software[DB/OL].[2015-5- 13]. https://www. syscan360. org/ slides/2014 _ZH_ BreakingA VSoftware_l oxeanKoret. pdf.
  • 9Bellissimo A, BurgessJ, Fu K. Secure software updates: Disappointments and new challenges[DB/OL].[2015-5-13]. https://www. usenix. org/legacy/event/ hotsec06/ tech/ full papers/ bellissimo/ bell issimo. pd f,.
  • 10Min B, Varadharajan V, Tupakula U, etal. Antivirus security: naked during updates[J]. Software: Practiceand Eic perience , 2014,44(10): 1201-1222.

引证文献3

二级引证文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部