期刊文献+

基于SSL的数字证据保护机制的安全解决方案 被引量:1

A SSL-based Security Solution for Digital Evidence Protection Mechanism
下载PDF
导出
摘要 随着信息技术的不断发展,计算机犯罪问题日趋严重,它直接危害国家的政治、经济、文化等各个方面的正常秩序。在计算机犯罪手段与网络安全防御技术不断升级的形势下,计算机取证的主要目的就是要收集数字证据,重构犯罪现场,为诉讼案件提供有效的证据。该文提出了基于SSL的数字证据保护机制,介绍了SSL安全协议,数字证书相关理论,并对其安全性进行了详细分析。经过这些改进措施,保证了数字证据的保密性和信息完整性,从而为计算机取证中的证据链的保全扣上了重要的一环。 With the development of information technology, the problem of computer crime comes to be more and more severe, it directly endangers the normal order of politics, economy and culture. Under the situation that ways of computer crime and safeguard techniques of network security are continually upgraded, computer forensics appears and develops rapidly, The main purpose of computer forensics is to collect digital evidence, reconstruct the alibi and provide valid evidences for law case. This paper presents the SSL- based Digital -evidence Protec- tion Mechanism and conducts a detailed analysis of its security. It Introduces the shortcomings of SSL protocol and the theory of digital certificates. These improvements ensure the confidentiality and integrity of information in the digital evidence, fastening an important part of the chain of evidence for preservation.
作者 游君臣
出处 《绵阳师范学院学报》 2008年第5期93-97,共5页 Journal of Mianyang Teachers' College
关键词 数字证据 证据完整性 数字签名 SSL digital evidence integrality of evidence digital signature SSL
  • 相关文献

参考文献4

二级参考文献17

  • 1Liu Jiqang,Han Zhen,Lan Zengwei.SECURE AUDIT LOGS SERVER TO SUPPORT COMPUTER FORENSICS IN CRIMINAL INVESTIGATIONS [ C ].In: proceedings of IEEE TENCON' 02,2002:180~183.
  • 2A Road Map for Digital Forensics Research 2001[C].In:Digital Forensics Research Workshop,http:∥www.dfrws.org,2001-11.
  • 3T Wu,M Malkin,D Boneh. Building intrusion tolerant applications [ C ].In: Proceedings of the 8th USENIX Security Symposium, 1999:79~91.
  • 4P MacKenzieand,M Reiter. Delegation of cryptographic servers for capture-resilient devices[C].In:Proceedings of the 8th ACM Conference on Computer and Communications Security,ACM,2001:10~19.
  • 5Michael Malkin,Thomas Wu,Dan Boneh. Building Intrusion Tolerance Applications[C].In:the 8th USENLX Security Symposium,1999.
  • 6The SSL Protocol Version 3.0 [S]. http://www. viable-herbal. com/secure/ssl, htm.
  • 7张焕国 覃中平 王丽娜.信息和通信安全—CCICS’2003[M].北京:科学出版社,2003,3..
  • 8沃里克·福特.安全电子商务—为数字签名和加密构造基础设施[M].北京:人民邮电出版社,2002,5..
  • 9Jose Sandoval,WWW server security[ EB/OL]. http://www.joseando-val. com/potential/security, doc.
  • 10Liang Yi wen, Li Huan, Kang Li shan, Dong Hong bin College of Computer Science, Wuhan University, Wuhan 430072, China.A Multi-Agent Immunology Model for Security Computer[J].Wuhan University Journal of Natural Sciences,2001,6(Z1):486-490. 被引量:5

共引文献10

同被引文献20

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部