期刊文献+

硬件支持的安全体系结构研究 被引量:1

Research on Hardware Supported Secure Architecture
下载PDF
导出
摘要 当前,计算的安全性变得日益重要,而安全现状却变得越来越严重。为此,我们需要从计算机体系结构的层次尤其是在底层硬件基础上寻求更根本的安全解决方法。本文综合评价了若干有代表性的硬件支撑的安全体系结构,分析了其积极的效果和存在的问题。基于上述分析,提出了一种硬件支持的、独立于操作系统且由用户自我决断的安全体系结构。 Currently, computing security becomes more and more important, but its status seems worse than ever. So we need to work at the level of computer architecture, especially at the hardware infrastructure, to search more essential solutions to security. This paper surveys and evaluates some typical hardware supported security architectures, and analyzes their positive effects and existing problems. Based on these descriptions and analysis, we propose a security architecture that is supported by hardware, independent of the operating system, and determined by users.
出处 《计算机工程与科学》 CSCD 2006年第8期17-18,46,共3页 Computer Engineering & Science
关键词 安全 体系结构 硬件 操作系统 security architecture hardware operating system
  • 相关文献

参考文献8

  • 1Intel Arehiteelure Soflware Developer' s Manual Volume 1 :Basic Architeeture [EB/OL]. http://intel.com/design/penlium4/manuals/25366515.pdf, 2004-03.
  • 2胡伟武,唐志敏.龙芯1号处理器结构设计[J].计算机学报,2003,26(4):385-396. 被引量:53
  • 3P Tyner. iAXP 432 General Data Processor Architecture Reference Manual[M]. Intel Corporation, 1981.
  • 4D Lie, C Thekkath, M Mitchell, et al. Architectural Support for Copy and Tamper Resistant Software[A]. ASPLOS-Ⅸ[C]. 2000. 169-177.
  • 5B Gassend, M van Dijk, S Devadas,et al. Aegis: Architecture for Tamper-Evident and Tamper-Resistant Processing[A]. Proc of the 17th Int' 1 Conf on Supercomputing[C].2003.
  • 6Trusled Compuling Group (TCG) Main Speeification Version I. 1a[EB/OL]. hup://www.trustedcomputinggroup.org/downloads/tcg_spec_1_1b.zip, 2004-03.
  • 7Security Model for the Next-Generation Secure Computing Base [EB/OL]. http://www.microsoft.com/resources/ngscb/documents/ngscb_security_model.doc, 2003-03.
  • 8Eugene Schuhz. Pandora's Box: Spyware, Adware, Autoexecution, and NGSCB[J]. Compuler & Securily, 2003,22(5) :366-367.

二级参考文献8

  • 1[1]Divid Patterson,John Hennessy. Computer Architecture: A Quantitative Approach. Morgan Kaufmann Publishers, 1996
  • 2[2]Kessler R. The Alpha 21264 Microprocessor. IEEE Micro, 1999,19(2): 24~36
  • 3[3]Kenneth Yeager. The MIPS R10000 Superscalar Microprocessor. IEEE Micro, 1996,16(2): 28~41
  • 4[4]Tim Horel, Gary Lauterbach. UntraSparc-III: Designing Third-Generation 64-bit Performance. IEEE Micro, 1999,19(3): 73~85
  • 5[5]Ashok Kumar. The HP PA-8000 RISC CPU. IEEE Micro, 1997,17(2): 27~32
  • 6[6]Joel Tendler, Steve Dodson, Steve Fields, Hung Le, Balaram Sinharoy. Power4 System Microarchitecture. IBM Technical White Paper, 2001
  • 7[7]Huck J et al. Introducing the IA-64 Architecture. IEEE Micro, 2000,20(5): 12~23
  • 8[8]Glenn Hinton, Dave Sager, Mike Upton, Darrell Boggs, Doug Carmean, Alan Kyker, Patrice Roussel. The Microarchitecture of the Pentium 4 Processor. Intel Technology, 2001

共引文献52

同被引文献6

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部