期刊文献+

从系统结构角度看计算机安全

原文传递
导出
摘要 当前,计算机系统安全威胁呈现出"战略化、专业化、持久化"的新特点,外围增强方式的安全防护技术手段已无法有效应对。业界开始探索采用软硬件协同安全设计的方法解决计算机安全问题,从系统结构入手提高计算机安全防护能力正成为一个重要的研究方向。本文结合国内外技术发展趋势和国内安全需求,给出了安全计算机体系结构方向的三个研究趋势。
作者 孟丹
出处 《保密科学技术》 2013年第2期6-9,1,共5页 Secrecy Science and Technology
  • 相关文献

参考文献11

  • 1程群.奥巴马政府的网络安全战略分析[J].现代国际关系,2010(1):8-13. 被引量:26
  • 2MILENKOVIC, M,MILENCOVIC, A,AND JOVANOV, E.A framework for trusted instruction execution via basic block signature verification[].Proceedings of the nd annual Southeast regional conference (ACM SE’).2004
  • 3McAfee Corp.A New Paradigm Shift: Comprehensive Security Beyond the Operating System[]..2012
  • 4Bernhard Kauer.OSLO:Improving the security of Trusted Computing[].th USENIX Security Symposium.
  • 5AryaSanjaya.Hardware Assisted Security:Anticipating Digital Threat and Challenges[].FIRST TCIDF.2012
  • 6Johannes Winter.Trusted Computing Building Blocks for Embedded Linux-based ARM Trust Zone Platforms[].STC’’Proceedings of the rd ACM workshop on Scalable trusted computing.
  • 7.Qubes[]..
  • 8.EMET Technology[].https://windowssecretscom/top-story/protecting-pcs-from-the-next-zero-day-threat/.
  • 9IBM,Microsoft,etc. Workshop on Advancing Computer Architecture Research (ACAR-II):Laying a New Foundation for IT:Computer Architecture for 2025 and Beyond . 2010
  • 10Ruby B Lee.Hardware-Enhanced Security[].ACM CCS.2012

二级参考文献21

  • 1Franklin D. Kramer and Lan-y Wentz, "Cyber Influence and International Security", Defense Horizons, No. 61, January 2008, p. 1.
  • 2John Rollins & Anna C. Henning, " Comprehensive National Cybersecurity Initiative: Legal Authorities and Policy Considerations", Congressional Research Service, 7 - 5700, 10 March 2009, http:// www. fas. org/sgp/crs/natsec/R40427, pdf, p. 4.
  • 3Stephen W. Korns, " Cyber Operations : The New Balance" , Joint Force Quarterly,lssue 54, 3rd quarter 2009, p. 99.
  • 4Stephen W. Korns, "Cyber Operations: The New Balance", Joint Force Quarterly, Issue 54, 3 rd quarter 2009, p. 99.
  • 5“美国研发智能电网应对大面积停电事故”,http://www.csee.org.cn/data/2009/0807/article_4022.htm.
  • 6" Cyberspace Policy Review: Assuring a Trusted and Resilient Information and Communications Infrastructure ", http ://www. whitehouse, gov/assets/documents/Cyberspace_Policy_Review_final, pdf, p. 2.
  • 7Defense Science Board ( DSB ), "' Defense Imperatives for the New Administration", August 2008, http ://www. acq. osd. mil/dsb/reports/2008 - 11 - Defense Imperatives. pdf, p. 3.
  • 8Center for Strategic and International Studies, "Securing Cyberspace for the 44th Presidency : A Report of the CSIS Commission on Cybersecurity for the LMth Presidency", December 2008, http ://csis. org/ files/media/csis/pubs/081208_securingcyberspace_44, pdf, p. 11.
  • 9"Cyberspace Policy Review: Assuring a Trusted and Resilient Information and Communications Infrastructure", pp. 1 -5.
  • 10John Rollins & Anna C. Henning, '" Comprehensive National Cybersecurity Initiative: Legal Authorities and Policy Considerations", 10 March 2009.

共引文献25

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部