期刊文献+

嵌入式系统的安全启动机制研究与实现 被引量:3

Research and Implementation of Security Startup Mechanism for Embedded System
下载PDF
导出
摘要 在当今移动智能服务平台高速发展的背景下,对嵌入式系统的安全启动机制进行深入研究。目前各个行业都不同程度的采用了嵌入式系统,随之发生了很多嵌入式系统遭受到很多认为的恶意攻击,给国家或个人带来巨大的资源、信息和财产的损失。所以保障嵌入式系统的安全启动运行就显得尤为重要,需要对其进行深入研究。 Under the background of the rapid development of mobile intelligent service platform,the security startup mechanism of embedded system is deeply studied.At present,various industries have adopted embedded systems to varying degrees,and many embedded systems have suffered many malicious attacks,which bring huge losses of resources,information and property to the country or individuals.Therefore,it is particularly important to ensure the safe start-up and operation of embedded systems,which needs to be studied in depth.
作者 郭福洲 Guo Fuzhou(Huanggang Polytechnic College,Huanggang Hubei,438002)
出处 《电子测试》 2019年第1期84-85,共2页 Electronic Test
关键词 嵌入式系统 安全启动机制 研究 embedded system security startup mechanism research
  • 相关文献

参考文献1

二级参考文献12

  • 1沈昌祥,张焕国,冯登国,曹珍富,黄继武.信息安全综述[J].中国科学(E辑),2007,37(2):129-150. 被引量:359
  • 2黄强.基于可信计算的终端安全体系结构研究[D].海军工程大学,武汉,2007.
  • 3Trusted Computing Group. TCG Specification Architecture Overview,Version1. 2 [OL]. http://www, trusted_computinggroup, org, 2003.
  • 4Trusted Computing Group. TCG Specification Architecture Overview[EB/OL], https://www, trustedcomputinggroup, org/ groups/TCG -1- 2 -Arehiteeture_Overview. pdf, 2007-8-8.
  • 5Rushb J. Noninterference, transitivity, and Channel-Control Security policies [R]. CSL-92-02. Menlo Park: Stanford Research Institute, 1992.
  • 6Goguen J A, Meseguer J. Security policies and security models [C]//Proc of the 1982 IEEE Syrup on Security and Privacy. Los Alamitos: IEEE Computer Society Press, 1982 : 11-20.
  • 7Mclena J. Security model s and information flow[C]//Proc of the 1990 IEEE Syrup. on Research in Security and Privacy. Los Alamitos:IEEE Computer Society Press, 1990 : 177-186.
  • 8Phalloran C O. A calculus of information flow[C] ffProc of 1st European Syrup on Research in Computer Security. Berlin: Springer-Verlag. 1990 : 147-159.
  • 9王飞,刘威鹏,沈昌祥.应用可信传递模型研究[J].计算机工程与应用,2007,43(29):1-3. 被引量:4
  • 10赵佳,沈昌祥,刘吉强,韩臻.基于无干扰理论的可信链模型[J].计算机研究与发展,2008,45(6):974-980. 被引量:29

共引文献4

同被引文献18

引证文献3

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部