期刊文献+

基于USB接口的涉密数据传输可信监控系统研究 被引量:1

Trustworthy monitoring system for secret data transmission based on USB interface
下载PDF
导出
摘要 针对传统基于USB接口的监控系统存在的诸如缺乏介质身份认证手段,难以有效地对各等级进行隔离,可信度低等问题,一种基于可信机制的数据传输监控系统被提出以解决上述问题。系统应用动态口令与指纹识别相结合的双向身份认证方案及文件过滤驱动技术,以"可信构件"为根构建系统内部的可信链模型,通过驱动层与应用层相结合的多级安全策略加强对机密信息的访问控制。通过分析并测试系统,表明方案是可行的且系统达到了"证实"的可信等级。 A data transmission monitoring system based on trusted mechanism is proposed in this paper, which is targeting at the problems in traditional monitoring system based on USB interface, such as the lack of medium identity authentication methods, the difficulty for conducting effective isolation of each grades, and the low credibility. In the proposed system, a two-way identity authentication scheme of combining dynamic password with fingerprint identification and a file filtering drive technology are applied, and a trusted chain model is built within the system in which "trustworthy components" are as trusted root, and a kind of multi-level security policy which combined security policies of driver layer with application layer is implemented to enhance access control of confidential information. By analyzing and testing the system, the results showed that the system was feasible and met to the "confirmed" trustworthiness level.
出处 《广西大学学报(自然科学版)》 CAS CSCD 北大核心 2011年第A01期93-99,共7页 Journal of Guangxi University(Natural Science Edition)
关键词 信息安全 USB接口 可信软件 动态口令 指纹识别 过滤驱动 information security USB interface trustworthy software dynamic password fingerprint recognition filtering drive
  • 相关文献

参考文献4

二级参考文献19

  • 1郭树行,高静,兰雨晴,金茂忠.面向可信的构件本体建模研究[J].南京大学学报(自然科学版),2005,41(z1):90-95. 被引量:2
  • 2陈火旺,王戟,董威.高可信软件工程技术[J].电子学报,2003,31(z1):1933-1938. 被引量:115
  • 3林闯,彭雪海.可信网络研究[J].计算机学报,2005,28(5):751-758. 被引量:253
  • 4梅宏,曹东刚,杨芙清.Development of Software Engineering: A Research Perspective[J].Journal of Computer Science & Technology,2006,21(5):682-696. 被引量:2
  • 5王怀民,唐扬斌,尹刚,李磊.互联网软件的可信机理[J].中国科学(E辑),2006,36(10):1156-1169. 被引量:59
  • 6赵会群.基于进程代数的软件体系结构建模、检测与评价研究:博士学位论文[M].沈阳:东北大学,2002..
  • 7ISO/IEC 15408-1.Information technology-Security techniques-Evaluation criteria for IT security-Part 1:Introduction and general model,Second edition.2005-10-01.
  • 8Avizienis A,Laprie J C,Randell B,et al.Basic concepts and taxonomy of dependable and secure computing.IEEE Transactions on Dependable and Secure Computing,2004,1(1):11-33.
  • 9Mollering G,The nature of trust:From Georg Simmel to a theory of expectation,interpretation and suspension.Sociology,2001,35:403-420.
  • 10Lewis J D,Weigert A.Trust as a social reality.Social Forces,1985,63(4):967-985.

共引文献91

同被引文献19

  • 1张斌.公安机关防止计算机泄密的对策及方法[J].北京人民警察学院学报,2004(2):56-58. 被引量:1
  • 2赵云霖,赵云霁.云计算环境下信息保护与防泄漏系统设计及实现[J].软件,2013,34(8):101-103. 被引量:2
  • 3张兵.内部网信息安全挑战与应对措施[J].通信世界,2007(13B):9-10. 被引量:5
  • 4侠名.浅析数据泄密(泄露)防护[EB/OL].http://www.vsharing.com/k/net/2012-12/676488.html,2012.
  • 5Lawton, G. New Technology Prevents Data Leakage[J]. Computer, 2008,(09):14-17.
  • 6魏传瑾.网络终端信息防泄漏安全策略研究与实现[D].郑州:中国人民解放军信息工程大学,2005.
  • 7林延君.局域网企业信息安全系统的设计与实现[D].大连:大连理工大学,2006.
  • 8肖武.主机型文件行为监控与内容保护系统设计与实现[D].成都:电子科技大学,2008.
  • 9贺新征.信息防泄漏保密系统若干问题的研究与实现[D].郑州:中国人民解放军信息工程大学,2007.
  • 10Al-Fedaghi S. A conceptual foundation for data loss prevention [J]. International Journal of Digital Content Technology and its Applications, 2011, 5(03): 293-303.

引证文献1

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部