期刊文献+

一种基于可信计算的恶意代码主动防御方法 被引量:1

Malicious Code Active Defense Method Based on Dependable Computing
下载PDF
导出
摘要 可执行恶意代码危害严重,而目前传统的防御软件是被动防御,再加上操作系统补丁分发的滞后性,基于可信计算的主动防御成为解决问题的关键。 Executable malicious code cause serious harm.But,at present,traditional defense software is passive,and patches distribution of operating system is lagging.Active defense based on dependable computing can solve the above problems.
作者 赵海成 陈涌
出处 《价值工程》 2011年第24期165-166,共2页 Value Engineering
关键词 恶意代码 计算机病毒 可信计算 主动防御 malicious code computer virus dependable computing active defense
  • 相关文献

参考文献7

  • 1Fred Cohen. Computer Viruses-Theory and Experiments [J]. Computers and Security, 1984, 6, ( 1 ): 22-35.
  • 2Fred Cohen. Computer Viruses [D]. PhD thesis, University of Southern California, 1985.
  • 3David Wagner, Janus: an approach for confinement ofuntrusted applications, Master thesis, 1999.
  • 4K. Buyens, BD Win, and W. Joosen. Resolving least privilege violations in software architectures. In SESS'09: Proceedings of the 5th International Workshop on Software Engineering for Secure Systems, Vancouver, Canada. May 2009.
  • 5Levin, TE, Irvine, CE, and Nguyen, TD. A Least Privilege Model for Static Separation Kernels. Technical Report NPS-CS-05-003, Center of informationSystems Security Studies and Research,Naval Postgraduate School,October 2004.1.
  • 6J.H. Saltzer and M.D. Sehroeder. The Protection of Information in Computet Systems. Proe. IEEE, vol. 63, No. 9, 1975:1278-1308.
  • 7沈昌祥.构建积极防御综合防范的防护体系[J].信息安全与通信保密,2004(5):18-19. 被引量:19

共引文献18

同被引文献8

引证文献1

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部