期刊文献+

桌面虚拟化技术在公安院校网络安全接入中的应用 被引量:5

Application of Desktop Virtualization Technology in Network Security Access of Public Security Colleges
下载PDF
导出
摘要 针对公安院校如何充分利用公安网和互联网的资源,特别是学校内网和公安网之间安全的数据共享和交换问题,介绍基于桌面虚拟化技术的安全接入架构,利用虚拟化技术实现校内网与公安网物理相连、逻辑隔离,提出从实施多重认证和多级权限访问控制、部署数据加密系统、设置安全网关和建立完善的审计系统等4个方面安全措施,在保证安全的前提下,实现资源的共享。 Aiming at the problem how to make full use of the public security network and Internet resources in the public security colleges, especially the safety of data sharing and exchange between campus network and the public security network. This paper introduces security access structure based on the desktop virtualization technology. Using virtualization technology realizes campus network and public security network connected really and isolated logically. The paper puts forward the four aspects of the safety measures including multiple authentication and multistage authority access control, deploying data encryption system, setting security gateway and building the perfect audit system. These measures realize the sharing of resources safely.
出处 《计算机与现代化》 2013年第5期121-123,共3页 Computer and Modernization
基金 宁波市软科学项目(2012A10053)
关键词 桌面虚拟化 安全措施 安全接入 desktop virtualization safety measures access safely
  • 相关文献

参考文献12

二级参考文献37

  • 1宁芝,方正.涉密信息系统虚拟化安全初探[J].保密科学技术,2012(2):70-74. 被引量:6
  • 2梁飞蝶,李锦涛.瘦客户计算应用协议中远程显示机制的比较[J].计算机工程与应用,2004,40(21):135-137. 被引量:12
  • 3李元兴,王新梅.密钥分散管理方案与线性分组码[J].通信学报,1993,14(3):22-28. 被引量:17
  • 4S.Nanda and T.Chineh.A Survey on Virtualization Technologies[M].Technical Report ECSL TR 179,SUNY at Stony Brook,Feb,2005.
  • 5Keith Adams,Ole Agesen,A Comparison of Software and Hardware Techniques for x86 Virtualization[J].In:Proeeeddings of the 12th international conference on Architectural support for programming languages and operating systems,2006.
  • 6Paul Barham,BorisBoris,Dragovic et al.Xen and the Art of Virtualizotion[J].In:Proceeddings of the 19th ACM symposium on Operating systems principles,2003.
  • 7S Jae Yong,Jason Nieh,Matt Selsky,et al.The Performance of Remote Display Mechanisms for Thin-Client Computing[J].In:Proceddings of the 2002 USENIX Annual Technical Conference,2002(6).
  • 8Citrix ICA Technology Brief.Technical White Poper[M].Boca Research,Boca Raton,FL,1999.
  • 9The Citrix Guide to desktop virtualization[M].Technical White Paper,http://www.citrix.com,2010(2).
  • 10新一代的桌面虚拟化技术[EB/OL].[2010-10-28].http://www.topoint.com.cn/html/article/2009/12/266155.html.

共引文献148

同被引文献30

引证文献5

二级引证文献13

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部