期刊文献+

基于可信计算的医院终端安全管理解决方案研究 被引量:4

Research on the Hospital Terminal Safety Management Solution Based on Trusted Computing
下载PDF
导出
摘要 为提升医院信息安全整体防护能力,在调研分析医院终端安全管理面临的问题和需求的基础上,提出了一种以可信计算为核心结合多种技术的终端安全管理解决方案,可有效降低已知和未知恶意程序造成的风险,确保所有接入终端、用户及日常使用可信、可管、可控。采用主动式、集中式的可信管理方式,对医院终端安全管理具有较好的实践意义和指导意义。 In order to improve the hospital information security protection capabilities,based on the investigation and analysis of the problems and requirements in hospital terminal security management,this paper presents a terminal security management solution which combines trusted computing with multiple technologies.It can effectively reduce the risk caused by known and unknown malicious codes,and ensure that all terminals,users and operations are trusted,manageable and controllable.The active and centralized trusted management mode has positive practical significance and guiding significance for hospital terminal security management.
作者 许浩 靳豪杰 张军超 冯建飞 XU Hao;JIN Hao-jie;ZHANG Junchao(Information Technology Office,Teaching and Research Guarantee Center,Air Force Medical University,Xi'an 710038,Shaanxi Province,P.R.C.)
出处 《中国数字医学》 2020年第12期17-20,共4页 China Digital Medicine
关键词 可信计算 医院终端安全 准入控制 域控制器 trusted computing hospital terminal security access control domain controller
  • 相关文献

参考文献5

二级参考文献52

  • 1魏乐,叶剑新,黄健.可信计算的初步研究[J].科技资讯,2007,5(13):166-167. 被引量:3
  • 2沈昌祥.可信计算平台与安全操作系统[J].网络安全技术与应用,2005(4):8-9. 被引量:13
  • 3林宣雄,李怀祖,张文修.安全内核方法与实现考虑[J].计算机科学,1996,23(1):36-39. 被引量:1
  • 4肖曦,韩军,汪伦伟.可信计算平台关键机制研究[J].信息工程大学学报,2007,8(2):217-220. 被引量:5
  • 5Oney W. Programming the Microsoft Windows Driver Model [M].马少华译 [s. l. ] :Microsoft Press, 1999.
  • 6Nie Xiao - Wei, Feng Deng - Guo, Che Jian - Jun, et al. Design and Implementation of Security Operating System Based on Trusted Computing[ C]//Proceedings of the Fifth International Conference on Machine Leanfing and Cybemetics. Dalian: [s. n.],2006:2776 - 2781.
  • 7Smith S W. Trusted Computing Platforms sign and Appli-cations[M].冯登国,徐震.张立武,译.北京:清华大学出版社.2006:148-151.
  • 8Price A. More Secure Computing[EB/OL]. 2006. http: \ \ www. trustedeomputinggroup, org \ TCGBaekgroundcr_ revised_ amp_ oct_ 17_ 06. perf.
  • 9王飞,刘毅.可信计算平台安全体系及应用研究[J].微计算机信息,2007(03X):76-78. 被引量:18
  • 10Jaeger T, Sailer R, Zhang X. Analyzing integrity protection in the SELinux example policy. In:Proceedings of the 12^th USENIX Security Symposium, USENIX, August 2003. 59-74

共引文献51

同被引文献22

引证文献4

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部