期刊文献+

进程安全保护技术综述 被引量:1

A survey on the studies of security guard technology for process
下载PDF
导出
摘要 进程安全保护是信息安全领域的一个研究热点,可以应用于计算机安全系统、网站保护、杀毒软件自保护、数字产权保护等方面.在信息安全研究的背景下,总结了进程所受到的威胁,包括软件和硬件方面的威胁;结合实际案例对进程安全保护技术从硬件和软件方面进行了详细分类,分析了每种技术的特点和不足;指出现在研究存在的问题,并展望了未来关于进程安全保护的研究方向和重点. Security and protection for process is a hot point in the field of information security, which can be applied to computer security system, anti-virus software, the protection of digital property rights, etc. In the context of information security, this paper summarizes the threats of the process including software threat and hardware threat, and combines the actual case. It classifies the security protection technology for process from hardware and software aspects, as well as analyzes the characteristics of each technology and its shortcomings. Finally the paper concludes the problems in the current research, and looks forward to the future research direction and focus on security protection technology for process.
出处 《哈尔滨工业大学学报》 EI CAS CSCD 北大核心 2016年第5期77-84,共8页 Journal of Harbin Institute of Technology
基金 国家"核高基"科技重大专项基金(2013ZX01029003-001) 国家高技术研究发展计划基金(2012AA01A401)
关键词 进程 安全保护 分类 研究方向 process security protection classification research direction
  • 相关文献

参考文献58

  • 1McAfee Corp.New paradigm shift: comprehensive security beyond the operating system [R].California: McAfee, 2012.
  • 2MILENA M, ALEKSANDAR M, EMIL J.Using instruction block signatures to counter code injection attacks [J].ACM Sigarch Computer Architecture News, 5,3(1):1-5.
  • 3冯登国,张阳,张玉清.信息安全风险评估综述[J].通信学报,2004,25(7):10-18. 被引量:308
  • 4JOHANNES W.Trusted computing building blocks for embedded Linux-based ARM trustzone platforms[C]// Proceedings of the 3rd ACM workshop on Scalable trusted computing.ACM Press, 2012:21-30.
  • 5邢栩嘉,林闯,蒋屹新.计算机系统脆弱性评估研究[J].计算机学报,2004,27(1):1-11. 被引量:84
  • 6IBM, MICROSOFT.Workshop on advancing computer architecture research (acar-ii): laying a new foundation for IT: computer architecture for 2025 and beyond [R].IBM, MICROSOFT, 2010.
  • 7金海.浅析云计算安全的核心问题 [J].中国计算机学会通讯, 9,5(2): 47.
  • 8连一峰.入侵检测综述(一)[J].网络安全技术与应用,2003(1):46-48. 被引量:7
  • 9BLAKLEY G R.Twenty years of cryptography in the open literature [C]//IEEE Symposium on Security and Privacy.Oakland: IEEE Press, 1999:106-107.
  • 10VIRGIL G.20 Years of operating system security (UNIX as one focus) [C]//IEEE Symposium on Security and Privacy.Oakland: IEEE Press, 1999:108-110.

二级参考文献36

  • 1United States General Accounting Office, Accounting and Information Management Division. Information Security Risk Assessment[Z]. Augest 1999.
  • 2National Institute of Standards and Technology. Special Publications 800-30, Risk Management Guide(DRAFT)[Z]. June 2001.
  • 3BUTLER S A, FISCHBECK P. Multi-Attribute Risk Assessment, Technical Report CMD-CS-01-169[R]. December 2001.
  • 4BUTLER S A. Security Attribute Evaluation Method: A Cost-Benefit Approach[Z]. Computer Science. Department, 2001.
  • 5PELTIER T R. Information Security Risk Analysis[Z]. Rothstein Associates Inc, 2001.
  • 6Bishop M. , Bailey D.. A critical analysis of vulnerability taxonomies. Department of Computer Science, University of California at Davis: Technical Report CSE-96-11, 1996
  • 7Longley D. , Shain M. , Caelli W.. Information Security: Dictionary of Concepts, Standards and Terms. New York: Macmillan, 1992
  • 8Beizer B.. Software Testing Techniques. 2nd edition. International Thomson Computer Press, 1990
  • 9Farmer D. , Spafford E. H.. The COPS security checker system. Purdue University, West Lafayette: Technical Report,Coast TR 94-01, CSD-TR-993, 1990
  • 10Baldwin R. W.. Kuang: Rule-based security checking. Programming Systems Research Group, Lab for Computer Science, MIT, Massachusetts: Technical Report, 1994

共引文献388

同被引文献1

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部