期刊文献+

基于改进可信计算的Docker容器安全防护技术研究 被引量:2

Research on Docker Container Security Protection Technology Based on Improved Trusted Computing
下载PDF
导出
摘要 随着云计算和容器技术的发展,Docker容器在众多领域得到了广泛应用。然而,容器安全问题日益凸显,成为制约容器技术发展的关键因素。文章针对现有可信计算技术在Docker容器安全防护方面的不足,提出了一种基于改进可信计算的Docker容器安全防护技术。 With the development of cloud computing and container technology,Docker containers have been widely used in many fields.However,container safety issues are increasingly prominent and have become a key factor restricting the development of container technology.In view of the shortcomings of the existing Trusted Computing technologies in the security protection of Docker containers,this paper proposes a security protection technology for Docker containers based on improved Trusted Computing.
作者 刘志明 LIU Zhiming(Changsha Civil Affairs Vocational and Technical College,Changsha 410004,Hunan,China)
出处 《数字通信世界》 2023年第8期49-51,共3页 Digital Communication World
基金 教育部科技发展中心2020年第二批中国高校产学研创新基金“新一代信息技术创新项目”《云环境下Docker容器隔离安全研究》(项目编号:2020ITA07004)。
关键词 可信计算 Docker容器 安全防护 隔离性 完整性 trusted computing docker container safety protection isolation integrity
  • 相关文献

参考文献7

二级参考文献49

  • 1沈昌祥,张焕国,王怀民,王戟,赵波,严飞,余发江,张立强,徐明迪.可信计算的研究与发展[J].中国科学:信息科学,2010,40(2):139-166. 被引量:253
  • 2Trusted Computing Group. TCG PC client specific implementation specification for conventional bios version 1.2, July 2005.
  • 3Apvrille A, Gordon D, Hallyn S, Pourzandi M, and Roy V. DigSig: Run-time authentication of binaries at kernel Level[C]. Proceedings of LISA '04 Eighteenth Systems Administration Conference. Atlanta, GA, USENIX Association November, 2004: 59-66.
  • 4Petroni N Jr and Fraser T, et al.. Copilot - A coprocessor -based kernel runtime integrity monitor[C]. Proceedings of the 13th conference on USENIX Security Symposium. San Diego, CA, 2004, Vol. 13: 13-13.
  • 5Sailer R, Zhang Xiao-lan, Jaeger T, and Van Doorn L. Design and implementation of a TCG-based integrity : architecture[C]. Proceedings of USENIX Security Symposium. Lake Tahoe, California, USA, ACM Press, Aug. 2004: 223-238.
  • 6Jaeger T, Sailer R, and Shankar U. PRIMA: Policy-reduced integrity t architecture[C]. Proceedings of the eleventh ACM symposium on Access control models and technologies. Lake Tahoe, California, USA, 2006: 19-28.
  • 7Shi E, Perrig A, and Van Doorn L. BIND: A fine-grained attestation service for secure distributed systems[C]. Proceeding of the IEEE Symposium on Security and Privacy. Oakland, CA, USA, IEEE Press, 2005: 154-168.
  • 8Loscocco P A, Wilson P W, Pendergrass J A, and McDonell C D. Linux kernel integrity measurement using contextual inspection[C]. Proceedings of the 2007 ACM workshop on Scalable trusted computing. Alexandria, Virginia, USA, 2007 21-29.
  • 9Thober M and Pendergrass J A. McDonell C D: Improving coherency of runtime integrity measurement[C]. Conference on Computer and Communications Security Proceedings of the 3rd ACM workshop on Scalable trusted computing. Alexandria, Virginia, USA, 2008: 51-60.
  • 10Gu Liang, Ding Xu-hua, Deng R H, Xie Bing, and Mei Hong. Remote attestation on program execution[C]. Conference on Computer and Communications Security Proceedings of the 3rd ACM workshop on Scalable trusted computing. Alexandria, Virginia, USA, 2008: 11-20.

共引文献339

同被引文献14

引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部