期刊文献+

基于等级保护的智能硬件安全研究 被引量:1

Research on Intelligent Hardware Security Based on Hierarchical Protection
下载PDF
导出
摘要 智能硬件即通过软硬件结合的方式,对传统设备进行改造使其拥有智能化的功能。智能化之后,硬件具备连接的能力,实现互联网服务的加载,形成"云+端"的典型架构,具备了大数据等附加价值。本文从分析智能硬件的"云"、"端"和"连接"等几方面的安全威胁,并根据已有的安全技术手段提出了扩展等级保护的智能硬件安全防护措施,在一定程度上能够解决智能硬件的安全问题,为智能硬件安全防护提供一定的理论指导。 Intelligent hardware is a combination of hardware and software,the transformation of traditional equipment to enable it to have the function of intelligent. After intelligent,the hardware has the ability to connect,to achieve the loading of internet services,the formation of the cloud + end typical architecture,with the additional value of the big data. Based on the analysis of intelligent hardware cloud,end and connected and so on several aspects of security threats,and puts forward the intelligent hardware safety protection measures extended protection according to existing security technology,security problems to a certain extent can solve the problem of intelligent hardware,provide some theoretical guidance for intelligence hardware security protection.
作者 陈武 王刚 邓惠贤 吴天宇 CHEN Wu;WANG Gang;DENG Huixian;WU Tianyu(State Grid Xintong Yili Technology Co.,Ltd.,Fuzhou 350001,China;State Grid Gansu Electric Power Company,Lanzhou 730050,China;Gansu Shining Science and Technology Co.,Ltd.,Lanzhou 730030,China)
出处 《现代信息科技》 2018年第10期153-155,共3页 Modern Information Technology
关键词 智能硬件 云计算安全 等级保护 移动应用安全 intelligent hardware cloud computing security hierarchical protection mobile application security
  • 相关文献

参考文献10

二级参考文献43

  • 1龙世军.解读标准-蓝牙2.1版现身——改善功耗及配对问题为首要目标[J].电子测试,2007,18(6):58-58. 被引量:1
  • 2Bluetooth SIG . Ultra Low Power Bluetooth Technology Specification. 2007. www.bluetooth.com.
  • 3Bluetooth SIG .Why is Low Energy So Efficient. 2008-12. www.bluetooth.com.
  • 4Bluetooth SIG .What is Bluetooth Low Energy Technology. 2008. www. bluetooth.com.
  • 5Bluetooth SIG .Core Specification v2.1+EDR of Bluetooth Specification. 2007. www.bluetooth.com.
  • 6孙纪坤,张小全.嵌入式Linux系统开发技术详解[M].北京:人民邮电出版社,2006:283-290.
  • 7DeKeukelaereF,AllanD,BueckerA.利用IBMRationalAppScan改进Web应用软件开发生命周期的安全性.IBMRedboooks,2010.1-35.
  • 8SantiagoCE,HondoM.Web2.0桌面与移动应用程序安全性设计.IBMdeveloperWorks,2012.1-10.
  • 9赵静.Web2.0应用安全深入解析:企业级Web2.0应用安全解决方案.IBMdeveloperWorks.2009.1-9.
  • 10OWASP. OWASP Top 1-2010 The Ten Most Critical Web Application Security Risks,2011.1-22.

共引文献63

同被引文献8

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部