期刊文献+

一种可信移动存储设备的研究与实现

Research and Implementation of a Trusted Removable Storage
下载PDF
导出
摘要 可信存储的发展为解决移动存储设备的安全问题提供了新的途径。本文从移动存储设备的安全需求出发,提出并实现了一种可信移动储存设备,并对其进行了测试和试用。结果表明,该设备能够防止文档内容泄露,满足数据的可信存储和流转需求。 The developing theory of trusted storage gives a new approach to solve the removable storage's security problem.For the purpose of solving this problem,this paper proposes and implements a trusted removable storage(TRS).TRS's testing and using results show that it can prevent document's content leakage and server trusted storage and transfers.
作者 高玉双
出处 《科技通报》 北大核心 2012年第12期85-87,90,共4页 Bulletin of Science and Technology
关键词 可信存储 可信移动存储设备 文档内容泄露防护 trusted storage trusted removable storage document's content leakage prevention
  • 相关文献

参考文献7

  • 1ROBERT Richardson. CSI Computer Crime& Security Survey [R/OL].[2008-10-17].http://www.gocsi.com.
  • 2Mesabi Group. Storage Needs To Be Trusted Everywhere [EB/OL]. [2007-06-04]. http://www.trustedcomputing- group.org/fites/resource_files/967COF97 -1D09 -3519 - AD0158A75489B26F/TCG_Commentary_Final.pdf.
  • 3Storage Networking Industry Association Storage Security Best Current Practices[EB/OL]. [2008-09-04]. http://www. trustedcomputinggroup.org/files/resource_files/145 E 13 C 1 - 1D09 -3519 -AD76E79C842CE323/SNIATechnicalPro- posal-Security-BCPs%2020080904.pdf.
  • 4Trusted Computing Group. TCG Specification Architecture Overview[B/OL]. [2007-08-02]. http://www.trustedcomput-inggroup.org/files/resource_files/AC652DE 1 -1D09 -3519 - ADA026AOC05CFAC2/TCG I 4 Architecture_Overview. pdf.
  • 5张焕国,罗捷,金刚,朱智强,余发江,严飞.可信计算研究进展[J].武汉大学学报(理学版),2006,52(5):513-518. 被引量:114
  • 6Trusted Computing Group. TGC Storage Architecture Core Specification[EB/OL]. [2009-04-20]. http://www.trusted- computinggroup.org/files/static_page_files/B6811067 - 1 DO9 -3519 -ADDAFC 18E3A87CB2/Storage_Architec- ture_Core_Spec v2_rl -Final.pdf.
  • 7Victor Yodaiken. The RTLinux Manifesto [C]//ln Proceed- ing of The 5th Linux Expo. 1999.

二级参考文献19

  • 1张焕国,毋国庆,覃中平,刘玉珍,刘毅,彭涛,韩永桥.一种新型安全计算机[J].武汉大学学报(理学版),2004,50(A01):1-6. 被引量:21
  • 2张焕国,刘玉珍,余发江,周强,叶新.一种新型嵌入式安全模块[J].武汉大学学报(理学版),2004,50(A01):7-11. 被引量:7
  • 3林闯,彭雪海.可信网络研究[J].计算机学报,2005,28(5):751-758. 被引量:253
  • 4Department of Defense Computer Security Center.DoD 5200. 28-STD. Department of Defense Trusted Computer System Evaluation Criteria [S]. USA:DOD, December 1985.
  • 5Trusted Computing Group. TCG Specification Architecture Overview [EB/OL]. [2005-03-01]. https://www.trustedcomputinggroup.org/ groups/ TCG_1_0_Architecture_Overview.pdf.
  • 6Intel Corporation. LaGrande Technology Architectural Overview [EB/OL].[2005-05-01]. http://www.intel.com/technology/security/.
  • 7Patel J,Teacy W T, Luke,et al. A Probabilistic Trust Model for Handling Inaccurate Reputation Sources[C]//Trust Management, Third International Conference, iTrust 2005. Berlin Heidelberg: Springer,2005 : 193-209.
  • 8Beth T, Borcherding M, Klein B. Valuation of Trustin Open Network[C]// Proc of the European Symposium on Research in Security (ESORICS). Brighton:Springer-Verlag, 1994 : 3-18.
  • 9Audun J. An Algebra for Assessing Trust in Certification Chains[C]// Proc of NDSS ' 99, Network and Distributed System Security Symposium. San Diego,California, USA, February 1999.
  • 10Pearson S. Trusted Computing Platform, the Next Security Solution[R]. Bristol UK: HP Laboratories,2002.

共引文献113

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部