期刊文献+

可信安全体系实施的工程化途径 被引量:1

Engineering Approaches to Implementation of Trusted Security System
下载PDF
导出
摘要 对建立可信安全体系所面临的问题进行了分析,给出必须在可信安全体系全生命周期中引入工程化、体系化方法的理由.在此基础上提出了基于过程的可信安全工程化模型以及该模型指导下的可信安全基线实施途径,对可信安全工程化进行了有益的探讨. This paper analyzes the problems of how to establish trusted security system,and gives the reasons of leading engineering and systematic method into the full life-cycle of trusted security system.On this basis,we propose a process-based model for trusted security system and approaches to Implementation trusted security baseline under the guidance of the model.Trusted security engineering approach is usefully discussed at last.
出处 《南京师范大学学报(工程技术版)》 CAS 2010年第3期69-73,共5页 Journal of Nanjing Normal University(Engineering and Technology Edition)
基金 铁道部信息技术中心专项基金(Y-2009-004)
关键词 可信安全 可信安全工程化模型 实施途径 trusted security trusted security engineering model implementation approach
  • 相关文献

参考文献6

  • 1Datta A,Franklin J,Garg D,et al.A logic of secure systems and its application to trusted computing[J].Security and Privacy,IEEE Symposium,2009,30:221-236.
  • 2Munoz A,Mana A,Serrano D.The role of trusted computing in secure agent migration[C]// Research Challenges in Information Science,Third International Conference.Fez,2009:255-264.
  • 3Glas B,Klimm A,Muller-Glaser K D,et al.Configuration measurement for FPGA-based trusted platforms[C]// Proceedings of the 2009 IEEE/IFIP International Symposium on Rapid System Prototyping.Washington DC:IEEE Computer Society,2009:123-129.
  • 4ZHU Lu,YU Sheng,ZHANG Xing,SHEN Changxiang.Formal Compatibility Model for Trusted Computing Applications[J].Wuhan University Journal of Natural Sciences,2009,14(5):388-392. 被引量:2
  • 5龚敏明,石志国.可信计算及其安全性应用研究综述[J].江西师范大学学报(自然科学版),2009,33(3):348-352. 被引量:5
  • 6郑志明,马世龙,李未,韦卫,姜鑫,张占利,郭炳晖.软件可信性动力学特征及其演化复杂性[J].中国科学(F辑:信息科学),2009,39(9):946-950. 被引量:12

二级参考文献12

  • 1Zhang Huanguo,Luo Jie,Jin Gang,Zhu Zhiqiang,Yu Fajiang,Yan Fei. Development of trusted computing research[J] 2006,Wuhan University Journal of Natural Sciences(6):1407~1413
  • 2Trusted Computing Group.TPM Specification Version 1.2 Revision 103 Part 1 Design Principles[].https://wwwtrustedcomputinggrouporg/specs/TPM/mainPD Prevzip.2007
  • 3Trusted Computing Group.TCG Software Stack (TSS) Specification Version 1.2 Errata A[].https://wwwtrustedcomputinggrouporg/specs/TSS/TSS___ Errata_A-finalpdf.2007
  • 4State Encryption Administration.Functionality and Interface Specification of Cryptographic Support Platform for Trusted Computing. http://www.oscca.gov.cn/up- file/ file64.pdf . 2007
  • 5Nierstrasz O.Regular Types for Active Objects[].Proceedings of the Eighth Annual Conference on Ob- ject-Oriented Programming Systems Languages and Appli- cations.1993
  • 6Zaha J M,Geisenberger M,Groth M.Compatibility Test and Adapter Generation for Interfaces of Software Compo- nents[].Proceedings of the st International Conference on Distributed Computing & Internet Technology.2004
  • 7Object Management Group.Unified Modeling Language Specification Version 1.5. http://www. omg.org/docs/formal/03-03-01.pdf . 2008
  • 8Zaremski A M,Wing J M.Signature Matching: A Key to Reuse[].ACM SIGSOFT Software Engneering.1993
  • 9Zaremski A M,Wing J M.Signature matching: a tool for using software libraries[].ACM Transactions on Software Engineering and Methodology.1995
  • 10Zaremski A M,Wing J M.Specification matching of software components[].ACM Transactions on Software Engineering and Methodology.1997

共引文献16

同被引文献14

引证文献1

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部