期刊文献+

基于分区架构的机载网络安保研究 被引量:3

The Research of Onboard Network Security based on Partition Architecture
下载PDF
导出
摘要 由于机载网络通信和数据共享的要求,物理隔离不是理想的安保手段,因此,接入公共网络将会引入了诸如旁路、篡改、病毒、颠覆等网络威胁。本文首先分析了为防护网络威胁所建立的分区安保,包括其中的四种安保策略、安保架构与微型内核功能。其次就分区内核的底层安保、中间件安保和应用层安保的特点进行了分析。最后分析了分区通信系统的安保策略与应具备的功能,并讨论了与实时公共对象请求代理体系结构合的实时分区安保的特点。 Because of the requirements of airborne network communications and data sharing, Physical isolation is not ideal security tool, Access to the public network will introduce the network threats, such as bypass, tampering, viruses, subversion. At first, this paper analyzed the threats to protect the network established by the district security. Secondly, analyzed the underlying security, the inten-nediate layer security and application layer characteristics of the partition core security. Finally, analyzed the security strategy and function of partition communication systems, and discuss the features of real-time partition security combined with common object request broker architecture.
作者 孙志强
出处 《计算机与网络》 2015年第14期66-69,共4页 Computer & Network
关键词 威胁 机载 网络安保 分区 内核 threats, onboard, network security,partition, kernel
  • 相关文献

参考文献4

  • 1ARINC653-1 Avionics Application Software Standard Interface Published: October 16, 2003: 11, 168.
  • 2Vanfleet, W. M. An Architecture for Deeply Embedded, Provable High Assurance Applications. May 2003:4-5.
  • 3Sandro Geric.Zeljko Htmtinski. Information System Security Threats Classifications [J]. Journal of Information and Organizational Sciences. Jun 2007:3-4.
  • 4郭乐深,苏森,杨放春,刘锦德.基于CORBA技术的策略安全信息系统的研究[J].小型微型计算机系统,2002,23(3):305-309. 被引量:6

二级参考文献4

  • 1秦志光,刘锦德.客户与服务器之间的安全交互作用[J].电子科技大学学报,1996,25(1):69-71. 被引量:7
  • 2R.Yavatkar.D.Pendarakis,R.Guerin.A Framework for police-based admission control[EB/OL].IETF Internet draft,April 1999.http://www.ietf.org html.charters/rap-charter.html.
  • 3J.Boyle,R,Cohen,D,Durham.The COPS(Common Open Policy Service Protocol[EB/OL].IETF Internet Draft,February 1999.http://www.jetf.org/html.charters
  • 4Wiliam R.Cheswick.Firewalls and internet security[M].Mcgraw-Hill press

共引文献5

同被引文献12

引证文献3

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部