期刊文献+

航天计算机网络安全防护技术综述 被引量:2

Survey of Spaceflight Computer Network Security Technique
下载PDF
导出
摘要 综合分析和评述国内外网络信息安全的发展现状及其发展趋势,着重对航天计算机网络信息安全可能存在的各种威胁和脆弱性进行总体分析,综述保障航天计算机网络信息安全现有的各类主要技术与途径,提出采取诸如物理安全、备份与恢复、防病毒、身份认证、信息加密、入侵检测和审计等技术手段,以建成一个成功的航天计算机网络安全防护体系. The current situation and trend of network information security technique development in the world are reviewed and analyzed in the paper. This paper presents an overall analysis of a wide variety of threats and vulnerability to the secure and reliable operation of our spaceflight computer network and the computers attached to it. To build a successful spaceflight computer network seeurity infrastructure, we examine different security tools and approaches available for use, and suggest techniques such as physical security, backup and recovery, antivirus, authentication and secrecy, intrusion detection and audit as basic countermeasures.
作者 汤生
出处 《空间控制技术与应用》 2010年第2期36-41,共6页 Aerospace Control and Application
关键词 航天计算机 网络安全技术 spaceflight computer network security technique
  • 相关文献

参考文献19

  • 1Comer D. Computer networks and internets[ M]. Upper Saddle River, New Jersey: Prentice Hall, 1997.
  • 2Huitema C. Routing in the Internet[ M ]. Upper Saddle River, New Jersey: Prentice Hall, 1995.
  • 3Feit S. TCP/IP[M].New York: McGraw-Hill, 1998.
  • 4Bellovin S M. Security problems in the TCP/IP protocol suite[J]. Computer Communication Review, 1989, 19 (2) :32-48.
  • 5Holbrook J P, Reynolds J K. Site security handbook [M]. New York: McGraw-Hill, 1999.
  • 6EIGamal T. A public key cryptosystem and signature scheme based on discrete logarithms [ J ]. IEEE Trans. Inform Theory, 1985, 31 IT (4) : 469-472.
  • 7Goldreich O, Rosenberg A L, Selman A L. Theoretical computer science[ M ]. Berlin : Springer-Verlag, 2001 : 164-186.
  • 8Pfleeger C P, Pflleeger S L. Security in computing[ M]. 3rd ed. New Jersey: Prentice Hall, 2003.
  • 9Merkle R C, Hellman M E. Hiding information and signatures in trap door knapsacks[J]. IEEE Trans. Inform Theory, 1978, 24(5): 525-530.
  • 10Schnorr C P. Efficient identification and signature for smart cards[J]. International Journal of Applied Cryptography, 1991, 4(3): 161-174.

共引文献6

同被引文献5

引证文献2

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部