期刊文献+

基于CityHash的政务网站完整性检查方法研究 被引量:2

Research on file integrity checking based on City Hash for e-government websites
下载PDF
导出
摘要 针对现有安全性检查工具应用于政务网站文件完整性检查效率低的问题,提出了UNIX环境下的基于CityHash的文件完整性检查系统并对其架构和模块进行了描述。分析总结了现代哈希City Hash的特点和优势,将其应用到系统中文件哈希值的生成。通过性能测试证明该方法是具有可行性和高效性的,将此系统运用到政府电子政务网站的文件完整性检查中能够迅速发现被篡改的文件,将危害降低到最小。 To resolve the problem of low efficiency when applying current security tools to the file integrity checking of e-government websites,this paper proposes a file integrity checking system based on City Hash under UNIX and describes the system's overall architecture and implementation. The characteristics and advantages of City Hash are summarized and analyzed. The system uses City Hash to generate each file's hash code. Performance analysis proves its feasibility and advantage. Applying the system to e-government websites helps the administrator to find out the tampered files rapidly and reduce the risk.
作者 陆阳 高宝
出处 《计算机工程与应用》 CSCD 北大核心 2016年第4期104-109,共6页 Computer Engineering and Applications
关键词 电子政务 信息安全 文件完整性检查 CITY HASH算法 e-govenment information security file integrity check City Hash
  • 相关文献

参考文献15

  • 1王浩.电子政务网站安全研究[J].信息通信,2012,25(1):122-123. 被引量:3
  • 2俞优,沈亮.政务网的安全建设新需求[J].信息网络安全,2010(10):33-34. 被引量:2
  • 3Piazza C,Pivato E,Rossi S.COPS-checker of persistent security[C]//Tools and Algorithms for the Construction and Analysis of Systems,Spain,2004.
  • 4Safford D R,Schales D L,Hess D K.The TAMU security package:an ongoing response to internet intruders in an academic environment[C]//Proceedings of the Fourth USENIX Security Symposium,1993.
  • 5Payne J,Shaio S,Hoff A V.Method for the distribution of code and data updates:US,08/690,257[P].1999.
  • 6Debar H.An introduction to intrusion detection[C]//Proceedings of Connect,2000.
  • 7Kim G H,Spafford E H.The design and implementation of Tripwire:a file system integrity checker[C]//Proceedings of the 2nd ACM Conference on Computer and Communications Security,New York,1994.
  • 8Pike G,Alakuijala J.Introducing City Hash[EB/OL].[2013-12-18].http://google-opensource.blogspot.com/2011/04/introducing-cityhash.html.
  • 9Hennessy J L,Patterson D A.Computer architecture:a quantitative approach[M].San Francisco:Morgan Kaufmann,2011:148-412.
  • 10Pike G,Alakuijala J.City Hash:fast hash functions for strings[R/OL].2012.http://www.stanford.edu/class/ee380/Abstracts/121017-slides.pdf.

二级参考文献5

共引文献3

同被引文献14

  • 1LAI C,LI H,LI X,et al.A novel group access authentication and key agreement protocol for machinetype communication[J/OL].Transactions on Emerging Telecommunications Technology,2015,26(3):414-431[2016-03-03].http://onlinelibrary.wiley.com/doi/10.1002/ett.2635.
  • 2LAI C,LI H,LU R,et al.SE-AKA:A secure and efficient group authentication and key agreement protocol for LTE networks[J/OL].Computer Networks,2013,57(17):3492-3510[2016-03-03].http://dx.doi.org/10.1016/j.comnet.2013.08.003.
  • 3SHAMIR A.How to share a secret[J/OL].Communications of the ACM.1979,22(11):612-613[2016-03-03].http://dx.doi.org/10.1145/359168.359176.
  • 4LAI C,LI H,LU R,et al.SEGR:A secure and efficient group roaming scheme for machine to machine communications between 3GPP and WiMAX networks[C/OL]//Proceedings of the of IEEE International Conference on Communication.Sydney:IEEE,2014:1011-1016[2016-03-03].http://dx.doi.org/10.1109/ICC.2014.6883452.
  • 5张力.基于PKI的网络安全技术在电子政务中的应用研究[D/OL].西安:西安电子科技大学,2014:9-58[2016-03-03].http://cdmd.cnki.com.cn/Article/CDMD-10701-1015440512.htm.
  • 6陈征,张成芬.陕西省电子政务安全保障体系的研究[J].西安邮电学院学报,2010,15(4):32-35. 被引量:8
  • 7曹玉娟,牛振东,赵堃,彭学平.基于概念和语义网络的近似网页检测算法[J].软件学报,2011,22(8):1816-1826. 被引量:15
  • 8颜海龙,闫巧,冯纪强,程小茁.基于PKI/CA互信互认体系的电子政务[J].深圳大学学报(理工版),2012,29(2):113-117. 被引量:14
  • 9李纲,毛进,陈璟浩.基于语义指纹的中文文本快速去重[J].现代图书情报技术,2013(9):41-47. 被引量:5
  • 10郑东,赵庆兰,张应辉.密码学综述[J].西安邮电大学学报,2013,18(6):1-10. 被引量:66

引证文献2

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部