期刊文献+
共找到18篇文章
< 1 >
每页显示 20 50 100
Go语言并发安全的Map探索及研究
1
作者 阮正平 蒋林峰 《科技资讯》 2023年第14期22-27,共6页
在云原生领域,大多数项目都是用Go语言开发的,而Go语言标准库中的Map又是开发过程中常用的内置数据结构。但是,在官方的设计中,Map并不是一种并发安全的数据类型。因此,该文首先介绍了Map的设计,分析了它不是并发安全的原因,其次论述了... 在云原生领域,大多数项目都是用Go语言开发的,而Go语言标准库中的Map又是开发过程中常用的内置数据结构。但是,在官方的设计中,Map并不是一种并发安全的数据类型。因此,该文首先介绍了Map的设计,分析了它不是并发安全的原因,其次论述了并发安全的Map的实现方式,包括加锁、Go官方的sync.Map以及自己通过分片加锁实现的方式,并设计了两大类实验,对这几种实现方式进行基准测试,最后根据测试结果进行了分析与技术选型的建议。 展开更多
关键词 Golang并发安全 sync.Map 分片加锁实现 实验设计 技术选型
下载PDF
并发安全的紧凑多重息票方案 被引量:1
2
作者 柳欣 徐秋亮 《电子学报》 EI CAS CSCD 北大核心 2012年第5期877-882,共6页
已有多重息票方案的弱点是缺乏支持用户根据需要选择最大兑换数量的高效协议.另一个缺陷是并不满足并发安全性.为了克服这些困难,提出两个并发安全的改进方案.第一个方案是利用关于两个被承诺值的知识证明和2轮并发零知识论证的Sigma协... 已有多重息票方案的弱点是缺乏支持用户根据需要选择最大兑换数量的高效协议.另一个缺陷是并不满足并发安全性.为了克服这些困难,提出两个并发安全的改进方案.第一个方案是利用关于两个被承诺值的知识证明和2轮并发零知识论证的Sigma协议编译器对底层的Blanton方案进行扩展得到的.第二个方案(即前一个方案的增强版本)利用直线提取技术实现了更为高效的安全性归约过程,并借助基于同态加密的非交互零知识论证避免了对随机预言机的使用.与其他的强不可分割的方案相比,第一个方案具有更高的通信效率,且第二个方案的安全性并不依赖于随机预言模型. 展开更多
关键词 电子现金 多重息票 非交互的零知识 并发安全 注册公钥模型
下载PDF
多一次Paillier求逆问题与并发安全的鉴别方案
3
作者 宋焰 《软件学报》 EI CSCD 北大核心 2008年第7期1758-1765,共8页
从计算难解性的角度重新考察Paillier的陷门单向函数,并提出多一次Paillier求逆问题这一关于Paillier求逆问题的推广问题.从计算难解性的角度考察了多一次Paillier求逆问题与Bellare等人提出的多一次RSA求逆问题之间的关系,并证明了在... 从计算难解性的角度重新考察Paillier的陷门单向函数,并提出多一次Paillier求逆问题这一关于Paillier求逆问题的推广问题.从计算难解性的角度考察了多一次Paillier求逆问题与Bellare等人提出的多一次RSA求逆问题之间的关系,并证明了在计算难解性的意义上。多一次Paillier求逆问题等价于多一次RSA求逆问题.以此为基础,进而提出一种新的鉴别方案,并证明在多一次Paillier求逆问题的难解性假设下这一鉴别方案具备并发安全性. 展开更多
关键词 陷门单向函数 Paillier求逆 RSA问题 难解性 鉴别方案 并发安全
下载PDF
Rust语言安全研究综述 被引量:1
4
作者 胡霜 华保健 +1 位作者 欧阳婉容 樊淇梁 《信息安全学报》 CSCD 2023年第6期64-83,共20页
Rust是为了解决系统编程领域的安全性问题,而设计的一门面向系统编程的兼具类型安全、内存安全和并发安全的新型程序设计语言,强调安全性和高性能,已经在操作系统内核、Web浏览器、网络协议栈、数据库和区块链等底层软件系统的构建中得... Rust是为了解决系统编程领域的安全性问题,而设计的一门面向系统编程的兼具类型安全、内存安全和并发安全的新型程序设计语言,强调安全性和高性能,已经在操作系统内核、Web浏览器、网络协议栈、数据库和区块链等底层软件系统的构建中得到了越来越广泛的应用。现有研究表明,尽管Rust的设计目标是保证安全性,但其自身仍然存在许多安全问题。作为一门系统编程语言,Rust的安全性直接影响到基于Rust开发的软件系统的安全性。随着Rust的广泛应用,对Rust语言安全的研究显得尤为重要。Rust语言安全研究正在成为研究热点,并且在近几年已经取得了较大研究进展。本综述基于该研究领域已经公开发表的46篇研究论文,对该领域的相关研究进行了系统整理、分析和总结:首先,研究分析了Rust的核心安全特性,包括函数式编程范式、强多态类型系统、基于所有权模型的自动内存管理、对非安全代码的显式标记和隔离;其次,提出了Rust语言安全研究领域的分类学,将已有研究分为安全实证研究、漏洞检测研究、安全增强研究和形式化验证研究四个热点方向,并分别对这四个方向上的相关研究进行了综述、深入分析和总结,同时分析了四个研究方向的内在联系;最后,指出了该研究领域的待解决的科学问题,并对未来可能的研究方向进行了展望,提出了四个潜在的研究方向,以期为相关领域的研究者提供有价值的参考。 展开更多
关键词 Rust语言 内存安全 并发安全 漏洞检测与修复
下载PDF
实时数据库的安全并发控制
5
作者 许贵平 李岚 朱红高 《福建电脑》 2006年第11期75-76,共2页
为了解决实时数据库系统中事务的实时性和安全性之间的矛盾,文中首先分析安全实时数据库系统中实时性与安全性需求之间的冲突,而后基于HP-2PL协议,结合安全因素给出了一种解决冲突的办法。在满足安全需求的基础上,实现数据库的安全实时... 为了解决实时数据库系统中事务的实时性和安全性之间的矛盾,文中首先分析安全实时数据库系统中实时性与安全性需求之间的冲突,而后基于HP-2PL协议,结合安全因素给出了一种解决冲突的办法。在满足安全需求的基础上,实现数据库的安全实时性能。 展开更多
关键词 安全实时数据库 隐蔽通道 优先倒置 安全并发控制策略
下载PDF
实时数据库的安全并发控制策略
6
作者 李岚 《计算机安全》 2006年第6期41-42,45,共3页
为了解决实时数据库系统中事务的实时性和安全性之间的矛盾,文中首先分析安全实时数据库系统中实时性与安全性需求之间的冲突,而后基于HP-2PL协议,结合安全因素给出了一种解决冲突的办法。在满足安全需求的基础上,实现数据库的安全实时... 为了解决实时数据库系统中事务的实时性和安全性之间的矛盾,文中首先分析安全实时数据库系统中实时性与安全性需求之间的冲突,而后基于HP-2PL协议,结合安全因素给出了一种解决冲突的办法。在满足安全需求的基础上,实现数据库的安全实时性能。 展开更多
关键词 安全实时数据库 隐蔽通道 优先倒置 安全并发控制策略
下载PDF
安全数据库系统中的事务 被引量:2
7
作者 肖卫军 卢正鼎 洪帆 《小型微型计算机系统》 CSCD 北大核心 2004年第4期591-594,共4页
在多级安全数据库系统中经典的 BL P模型的“向上写”违反了数据库的完整性 ,并产生隐通道和带来多实例问题 .事务间的提交和回退依赖也会产生隐通道 .在对事务安全性分析的基础上提出了安全事务模型和安全事务正确性标准 -安全冲突可... 在多级安全数据库系统中经典的 BL P模型的“向上写”违反了数据库的完整性 ,并产生隐通道和带来多实例问题 .事务间的提交和回退依赖也会产生隐通道 .在对事务安全性分析的基础上提出了安全事务模型和安全事务正确性标准 -安全冲突可串行化 (SCSR) . 展开更多
关键词 安全数据库 安全事务模型 安全冲突可串行化 安全并发控制 隐通道
下载PDF
数据库安全在煤炭领域的研究
8
作者 罗晓 罗来瑞 《煤炭技术》 CAS 北大核心 2013年第2期179-181,共3页
隐通道对安全数据库的危害是不言而喻的,通过对隐通道产生的分析,总结了几种避免隐通道的算法,通过对算法的模拟可以发现其均能够消除低安全级事务对高安全级事务的递交依赖,从而避免隐通道的产生。
关键词 安全数据库 安全事务模型 安全并发控制 隐通道
下载PDF
肿瘤放疗患者进行PICC导管维护以及并发症处理的护理研究
9
作者 韩桂红 《中文科技期刊数据库(引文版)医药卫生》 2022年第6期182-185,共4页
研究对恶性肿瘤放疗患者置入PICC导管维护方法和并发症的防范与管理。方法:选择从2019年8月至2021年9月在放疗科接受放疗的110例肿瘤患者进行分析,将患者随机分为实验组和对照组,每组各55例,观察两组患者的护理效果。结果:经过对PICC置... 研究对恶性肿瘤放疗患者置入PICC导管维护方法和并发症的防范与管理。方法:选择从2019年8月至2021年9月在放疗科接受放疗的110例肿瘤患者进行分析,将患者随机分为实验组和对照组,每组各55例,观察两组患者的护理效果。结果:经过对PICC置管导管实施不同程度的护理措施后,实验组并发症发生率仅为5.4%,而对照组导管留置并发症概率达到了16.4%,两组差异显著,P<0.05;实验组患者护理满意度可达94.5%,明显高于对照组的72.7%,P<0.05;实验组SF-36评分(82.36±5.66)、SAS评分(38.51±4.36)分别优于对照组SF-36评分(70.44±6.28)、SAS评分(44.69±5.52),P<0.05。结论:强化对肿瘤放疗患者PICC导管的维护能够有效防止置管并发症的出现,改善病人生活品质,对保证病人持续治疗和改善生存预后具有重要意义。 展开更多
关键词 肿瘤放疗 PICC导管维护 护理 并发症处理肿瘤作为威胁人类生命安全的重要因素之一
下载PDF
Transcatheter to Close the Patent Duetus Arteriosus and Atrial Septal Defects in Children
10
作者 赵乃琤 王大为 +3 位作者 王凤鸣 龚小平 秦玉明 胡宝珍 《Journal of Nanjing Medical University》 2003年第6期309-312,共4页
Objective: To evaluate the therapeutic effect, safety and complications oftranscathetering Amplatzer device in the closure of patent ductus arteriosus (PDA) and atrial septaldefects (ASD) in children. Methods: Patient... Objective: To evaluate the therapeutic effect, safety and complications oftranscathetering Amplatzer device in the closure of patent ductus arteriosus (PDA) and atrial septaldefects (ASD) in children. Methods: Patients with PDA (n = 25) and ASD ( n = 16), confirmed byechocardiography, were treated by transcatheterization. Amplatzer occluder device was placed by thetranscatheterization with the image support of X-ray and transthoracic echocardiography ( TTE) . TheTTE, ECG and X-ray examination were engaged to evaluate the therapeutic results on the time pointsof 24 h , 1, 3 , 6, 12 months after the operation, and all these cases were engaged to the follow-upexamination. Results: The cardioangiographic diameter was 13.0-28.0 mm ([19.3+-4.9] mm) in ASD and2.0-7.7 mm ([3.9+-1.5] mm) in PDA . The diameter of the Amplatzer occluder selected were 13.0-30.0mm ( [20.6+-5.1] mm) in ASD and 4.0-12.0 mm ([6.6+-1.9] mm) in PDA , respectively. All the Amplatzeroccluders were placed successfully. There were no complications during and after the operation.Very small residual shunt was still found soon after the operation in 10 cases , and there were noresidual or recanalization after three months of the operation. The pulmonary artery pressure andheart size were significantly decreased in follow-up examination . Conclusion: Transcatheteringclosure with Amplatzer device is an effective, simple and safe technique in the treatment of ASD andPDA in children. 展开更多
关键词 patent ductus arteriosus atrial septal defects TRANSCATHETER amplatzerdevice
下载PDF
Hemi-semi Laminectomy Approach for the Microsurgical Treatment of Spinal Schwannomas 被引量:11
11
作者 Xing Su Wei Shi +2 位作者 Qing-feng Huang Jian-hong Shen Jian Chen 《Chinese Medical Sciences Journal》 CAS CSCD 2012年第2期96-100,共5页
Objective To evaluate the safety and efficiency of hemi-semi laminectomy approach for the micro- surgical treatment of spinal schwannomas. Methods A total of 22 patients underwent hemi-semi laminectomy for the micros... Objective To evaluate the safety and efficiency of hemi-semi laminectomy approach for the micro- surgical treatment of spinal schwannomas. Methods A total of 22 patients underwent hemi-semi laminectomy for the microsurgical removal of spinal schwannomas during a period of 2009 and 2011 in Affiliated Hospital of Nantong University. We ret- rospectively analyzed the clinical outcomes of these patients. Results Of them, 5 cases were diagnosed with cervical schwannomas, 9 with thoracic schwarmomas, and 8 with lumbar schwannomas. All the tumors including two dumbbell schwannomas were totally removed without major complications. Postoperatively, all patients were followed up from 6 to 36 months. The symp- toms and signs were obviously improved, and no tumor recurrence or spinal deformity occurred. Conclusion Hemi-semi laminectomy is a safe and effective method for resection of spinal schwan- nomas 展开更多
关键词 spinal tumor SCHWANNOMAS MICROSURGERY LAMINECTOMY
下载PDF
Donor safety in adult living donor liver transplantation using the right lobe: Single center experience in China 被引量:4
12
作者 Fu-Gui Li Lu-Nan Yan Yong Zeng Jia-Yin Yang Qi-Yuan Lin Xiao-Zhong Jiang Bin Liu 《World Journal of Gastroenterology》 SCIE CAS CSCD 2007年第27期3752-3755,共4页
AIM: To evaluate the safety of donors in adult living donor liver transplantation (LDLT) using the right lobe in a single liver transplantation center in China. METHODS: We investigated retrospectively 52 living donor... AIM: To evaluate the safety of donors in adult living donor liver transplantation (LDLT) using the right lobe in a single liver transplantation center in China. METHODS: We investigated retrospectively 52 living donor liver resections performed from October 2003 to July 2006. All patients were evaluated by blood tests and abdominal CT. The mean donor age was 28.2 ± 7.4 years. Residual liver volume was 42.1% ± 4.7%. Mean operative time was 420 ± 76.2 min; mean ICU stay, less than 36 h; mean hospital stay, 16.4 ± 8.6 d; and mean follow-up period, 6 mo. RESULTS: There was no mortality. The overall complication rate was 40% (21 donors). Major complications included biliary leak in two, and pneumonia in 2 donors. Minor complications included mild pleural effusion in 12 donors, transient ascites in 6, mild depression in 4, intra-abdominal collections in 2, and wound infections in 1 donor. Residual liver volume did not affect the complication rate. None required re- operation. Return to pre-donation activity occurred within 5-8 wk. CONCLUSION: Right hemi-hepatectomy can be performed safely with minimal risk in cases of careful donor selection. Major complications occurred in only 7.7% of our series. 展开更多
关键词 Safety DONOR Liver transplantation COMPLICATION
下载PDF
Clinical study on safety of adult-to-adult living donor liver transplantation in both donors and recipients 被引量:18
13
作者 Bin Liu Lu-Nan Yan Wen-Tao Wang Bo Li Yong Zeng Tian-Fu Wen Ming-Qing Xu Jia-Yin Yang Zhe-Yu Chen Ji-Chun Zhao Yu-Kui Ma Jiang-Wen Liu Hong Wu 《World Journal of Gastroenterology》 SCIE CAS CSCD 2007年第6期955-959,共5页
AIM: TO investigate the safety of adult-to-adult living donor liver transplantation (A-A LDLT) in both donors and recipients. METHODS: From January 2002 to July 2006, 50 cases of A-A LDLT were performed at West Ch... AIM: TO investigate the safety of adult-to-adult living donor liver transplantation (A-A LDLT) in both donors and recipients. METHODS: From January 2002 to July 2006, 50 cases of A-A LDLT were performed at West China Hospital, Sichuan University, consisting of 47 cases using right lobe graft without middle hepatic vein (HHV), and 3 cases using dual grafts (one case using two left lobe, 2 using one right lobe and one left lobe). The most common diagnoses were hepatitis B liver cirrosis, 30 (60%) cases; and hepatocellular carcinoma, 15 (30%) cases in adult recipients. Among them, 10 cases had the model of end-stage liver disease (HELD) with a score of more than 25. Donor screening consisted of reconstruction of the hepatic blood vessels and biliary system with 3-dimension computed tomography and volumetry of whole liver and right liver volume. Various improved surgical techniques were adopted in the procedures for both donors and recipients. RESULTS: Forty-nine right lobes and 3 left lobes (2 left lobe grafts for 1 recipient, 1 left lobe graft for 1 recipient who had received right lobe graft donated by relative living donor) were obtained from 52 living donors. The 49 right lobe grafts, without HHV, weighed 400 g-850 g (media 550 g), and the ratio of graft volume to recipient standard liver volume (GV/SLV) ranged from 31.74% to 71.68% (mean 45.35%). All donors' remnant liver volume was over 35% of the whole liver volume. There was no donor mortality. With a follow- up of 2-52 mo (media 9 too), among 50 adult recipients, complications occurred in 13 (26%) cases and 4 (8%) died postoperatively within 3 mo. Their 1-year actual survival rate was 92%.CONCLUSION: When preoperative CT volumetry shows volume of remnant liver is more than 350, the ratio of right lobe graft to recipients standard liver volume exceeding 40%, A-A LDLT using right lobe graft without MHV should be a very safe procedure for both donors and recipients, otherwise dual grafts liver transplantation should be considered. 展开更多
关键词 Adult-to-adult living donor liver transplantation Middle hepatic vein Dual grafts Right lobe graft Standard liver volume GRAFTS Weight COMPLICATION
下载PDF
CLINICAL COMPLICATIONS AND SAFETY OF TRANSESOPHAGEAL ECHOCARDIOGRAPHY:A REPORT OF 1552 EXAMINATIONS
14
作者 王国干 程克正 +4 位作者 孟宪强 樊朝美 杨浣宜 刘汉英 蔡如升 《Chinese Medical Sciences Journal》 CAS CSCD 1998年第4期242-244,共3页
Method Fifteen hundred and fifty two patients with heart disease were examined with monoplane, biplane and omniplane TEE probe(including male 727, female 825;9~76 years old) During the s... Method Fifteen hundred and fifty two patients with heart disease were examined with monoplane, biplane and omniplane TEE probe(including male 727, female 825;9~76 years old) During the same period, 113 307 precordial echocardiographic examinations were performed in our laboratory The ratio between TEE and transthoracic Echo examines was 1:73 Result All different kinds of complication were occurred during TEE examination, including vomiting, minor mucus bleeding, laryngospasm, mandibular dislocation, angina pectoris, arrhythmia, even ventricular fibrillation and death The article suggested that there were five steps must be improved during TEE examination including instrument and patients preparation, local anesthesia, manipulation technique and TEE probes pattern Conclusion Although TEE is a semiinvasive technique and can cause some kinds of complication, it is a safe technique if the five steps are improved 展开更多
关键词 transesophageal echocardiography COMPLICATION
下载PDF
Diagnostic endoscopic ultrasonography:Assessment of safety and prevention of complications 被引量:33
15
作者 Christian Jenssen Maria Victoria Alvarez-Sánchez +1 位作者 Bertrand Napoléon Siegbert Faiss 《World Journal of Gastroenterology》 SCIE CAS CSCD 2012年第34期4659-4676,共18页
Endoscopic ultrasonography (EUS) has gained wide acceptance as an important, minimally invasive diagnostic tool in gastroenterology, pulmonology, visceral surgery and oncology. This review focuses on data regarding ri... Endoscopic ultrasonography (EUS) has gained wide acceptance as an important, minimally invasive diagnostic tool in gastroenterology, pulmonology, visceral surgery and oncology. This review focuses on data regarding risks and complications of non-interventional diagnostic EUS and EUS-guided fine-needle biopsy (EUS-FNB). Measures to improve the safety of EUS und EUS-FNB will be discussed. Due to the specific mechanical properties of echoendoscopes in EUS, there is a low but noteworthy risk of perforation. To minimize this risk, endoscopists should be familiar with the specific features of their equipment and their patients' specific anatomical situations (e.g., tumor stenosis, diverticula). Most diagnostic EUS complications occur during EUS-FNB. Pain, acute pancreatitis, infection and bleeding are the primary adverse effects, occurring in 1% to 2% ofpatients. Only a few cases of needle tract seeding and peritoneal dissemination have been reported. The mortality associated with EUS and EUS-FNB is 0.02%. The risks associated with EUS-FNB are affected by endoscopist experience and target lesion. EUS-FNB of cystic lesions is associated with an increased risk of infection and hemorrhage. Peri-interventional antibiotics are recommended to prevent cyst infection. Adequate education and training, as well consideration of contraindications, are essential to minimize the risks of EUS and EUS-FNB. Restricting EUS-FNB only to patients in whom the cytopathological results may be expected to change the course of management is the best way of reducing the number of complications. 展开更多
关键词 Endoscopic ultrasonography Endoscopic ul-trasonography-guided fine-needle biopsy COMPLICATIONS CONTRAINDICATIONS Risk SAFETY PERFORATION BLEEDING Infection Acute pancreatitis
下载PDF
Minimally invasive video-assisted thyroidectomy for thyroid adenoma 被引量:1
16
作者 Guangquan Zong Xushun Liu Feng Wang 《The Chinese-German Journal of Clinical Oncology》 CAS 2009年第8期460-462,共3页
Objective: The aim of the study was to investigate the value of minimally invasive video-assisted thyroidectomy for thyroid benign adenoma. Methods: From June 2003 to June 2007, 128 cases of thyroid tumors, includin... Objective: The aim of the study was to investigate the value of minimally invasive video-assisted thyroidectomy for thyroid benign adenoma. Methods: From June 2003 to June 2007, 128 cases of thyroid tumors, including 123 cases of adenoma and 5 cases of carcinoma, were performed by Miccoli's endoscopic thyroidectomy. The surgical techniques and the clinical outcomes with respect to pathologic results, duration of operation, postoperative drainage, pain, cosmetic results and complications of endoscopic thyroid surgery via the neck approach were retrospectively summarized. Results: NI the patients underwent minimally invasive endoscope-assisted thyroidectomy successfully. Five cases of carcinoma revealed by frozen section. In which, 3 papillary carcinoma cases underwent subtotal thyroidectomy of disease-side in video-assisting, whereas the other 2 cases with follicular and medullary carcinoma underwent conventional total thyroidectomy of disease-side combined with subtotal thyroidectomy of the opposite-side. The transient hoarseness occurred in one patient and recovered well one week later, and the other patients recovered successfully without any complications. Conclusion: Minimally invasive video-assisted thyroidectomy for thyroid adenoma is safe and reliable. This procedure offers a shorter incision, less invasion and better cosmetic results as compared with conventional thyroidectomy. 展开更多
关键词 ENDOSCOPY THYROIDECTOMY thyroid adenoma
下载PDF
Building a highly available and intrusion tolerant database security and protection system ( DSPS) 被引量:2
17
作者 蔡亮 杨小虎 董金祥 《Journal of Zhejiang University Science》 EI CSCD 2003年第3期287-293,共7页
Database Security and Protection System (DSPS) is a security platform for fighting malicious DBMS. The security and performance are critical to DSPS. The authors suggested a key management scheme by combining the serv... Database Security and Protection System (DSPS) is a security platform for fighting malicious DBMS. The security and performance are critical to DSPS. The authors suggested a key management scheme by combining the server group structure to improve availability and the key distribution structure needed by proactive security. This paper detailed the implementation of proactive security in DSPS. After thorough performance analysis, the authors concluded that the performance difference between the replicated mechanism and proactive mechanism becomes smaller and smaller with increasing number of concurrent connections; and that proactive security is very useful and practical for large, critical applications. 展开更多
关键词 Information warfare Proactive security Intrusion tolerant DSPS(Database Security and Protection System)
下载PDF
A Concurrent Security Monitoring Method for Virtualization Environments
18
作者 TIAN Donghai JIA Xiaoqi +1 位作者 CHEN Junhua HU Changzhen 《China Communications》 SCIE CSCD 2016年第1期113-123,共11页
Recently,virtualization technologies have been widely used in industry.In order to monitor the security of target systems in virtualization environments,conventional methods usually put the security monitoring mechani... Recently,virtualization technologies have been widely used in industry.In order to monitor the security of target systems in virtualization environments,conventional methods usually put the security monitoring mechanism into the normal functionality of the target systems.However,these methods are either prone to be tempered by attackers or introduce considerable performance overhead for target systems.To address these problems,in this paper,we present a concurrent security monitoring method which decouples traditional serial mechanisms,including security event collector and analyzer,into two concurrent components.On one hand,we utilize the SIM framework to deploy the event collector into the target virtual machine.On the other hand,we combine the virtualization technology and multi-core technology to put the event analyzer into a trusted execution environment.To address the synchronization problem between these two concurrent components,we make use of Lamport's ring buffer algorithm.Based on the Xen hypervisor,we have implemented a prototype system named COMO.The experimental results show that COMO can monitor the security of the target virtual machine concurrently within a little performance overhead. 展开更多
关键词 security virtualization technology concurrent monitoring
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部