期刊文献+

仿基因计算机的基因与免疫模型

Gene and immune model of genetic computer
下载PDF
导出
摘要 将生物学中的基因遗传和免疫理论,同计算机信息安全理论相结合,在可信计算的基础上,研究能够提供自我保护、自主免疫、动态进化等特性的新一代计算机系统--仿基因计算机系统。结合公钥加密算法、单向散列算法和自然语言文本水印技术,对仿基因计算机的基因算法和免疫模型进行详细的阐述,并说明了该模型的可行性、安全性和有效性。 Referencing to the principles of biology and genetic immunization, as well as the theories of security computer information, this article is aimed at supplying a new generation of computer system--imitation gene computer system, which has features of self-preser- vation, autogenously vaccine and dynamic evolution. Combined with the public key encryption algorithms, one-way hash algorithms and natural language text watermarking technology, the imitation gene computer' s immune model and genetic algorithm are described in detail, besides, the feasibility, safety and efficiency of the model are also proposed.
作者 朱洪亮 余综
出处 《计算机工程与设计》 CSCD 北大核心 2009年第17期3953-3956,共4页 Computer Engineering and Design
关键词 遗传 免疫 信息安全 可信计算 仿基因 heredity immunity information security trusted computing imitation gene
  • 相关文献

参考文献7

二级参考文献18

  • 1王飞,刘毅.可信计算平台管理中心的设计与实现[J].微计算机信息,2007,23(3):91-93. 被引量:8
  • 2Katzenbeisser, S. C. Principles of Steganogtaphy. In: S. Katzenbeisser and F. A. P. Petitcolas(eds. ) ,Information Hiding[ C ]. Techniques for Steganography and Digital Watermarking. Boston: Artech, 2000,17- 41.
  • 3Brassil, J., N. F. Maxemchuk, and L. O' Gonnan. Electronic Marking and Identification Technique to Discourage Document Copying[C] .Proceedings of INFOCOM '94,1994,1278- 1287.
  • 4Maxemchuk, N. F. 1994. Electronic Document Distribution[ J ]. AT&T Technical Journal, September/October, 73 - 80.
  • 5Low, S. H., N. F. Maxemchuk, and A. M. Lapnoe. Document Identification for Copyright Protection Using Centroid Detection[J]. IEEE Transactions on Communication, 1998,46(3) ,372 - 383.
  • 6Atallah, M. J., C. J. McDonough, V. Raskin, and S. Nirenburg. Natural Language Processing for Information Assurance and Security:An Overview and Implementations [ C ]. In: M. Shaeffer ( ed. ), NSPW' 00: Proceedings of Workshop on New Paradigms in Information Security, Cork, Ireland, September 2000. New York: ACM Press, 51 - 65.
  • 7Mikhail J., Atallah, Samuel S., Wagstaff, Jr.. Watermarking with Quadratic Residues[C]. Working Paper,Department of Computer Science, Purdue University, 1996.
  • 8Mikhail J. Atallah, Victor Raskin, Mchael Crogan, Christian Hempelimann, Flofian Kerschbaum, Dina Mohamed and Sanket Naik. Natural Language Watetmarking:Design,Analysis, and a Proof-of- Concept Implementation[C]. Informarion Hiding 2001 : 185 - 199.
  • 9Mikhail J. Atallah, Craig J. Mcdonough, Victor Raskin. Natural Language for Information Assurance and Security:An Overview and Implementation[C] .Published in: M. Schaefer( ed. ) ,Proceedings. New Security Paradigm Workshop.September 18th-22nd,Ballycotton, Cork Ireland.New York:ACM Press,2000, pp.51-65.
  • 10Nirenburg, S., and V. Raskin 2003. Ontological Semantics. Camhridge[ M ], MA: MIT Press (forthcoming). Prepublication draft, http://crl.nmsu. edu/Staff. Pages/Technical/sergei/book/index - book. html.

共引文献77

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部