期刊文献+
共找到4篇文章
< 1 >
每页显示 20 50 100
计算机信息系统安全技术及其应用分析 被引量:1
1
作者 刘双辉 《数字技术与应用》 2016年第4期207-207,共1页
当前计算机网络信息技术的发展越来越快,同时对计算机信息系统安全技术提出的要求也越来越高,所以不仅要从计算机安全技术着手,更要从人们的思想上提高。不仅要吸取过去的技术经验,还要注重创新,将过去的成功技术概念与现代的技术思想... 当前计算机网络信息技术的发展越来越快,同时对计算机信息系统安全技术提出的要求也越来越高,所以不仅要从计算机安全技术着手,更要从人们的思想上提高。不仅要吸取过去的技术经验,还要注重创新,将过去的成功技术概念与现代的技术思想相结合才能为计算机信息系统安全技术的深入提供长足发展,才能为我国乃至世界的计算机保驾护航。 展开更多
关键词 计算机系统安全技术 加密 防火墙 安全
下载PDF
我国自主研发成功“计算机系统安全防护技术”
2
《中国信息导报》 CSSCI 2004年第7期62-62,共1页
关键词 中国 计算机系统安全防护技术 身份识别 访问控制 数据备份
原文传递
A Secure Trust Model for P2P Systems Based on Trusted Computing 被引量:1
3
作者 郝黎明 杨树堂 +1 位作者 陆松年 陈恭亮 《Journal of Shanghai Jiaotong university(Science)》 EI 2008年第1期86-90,共5页
Trust is one of the most important security requirements in the design and implementation of peer-to-peer (P2P) systems. In an environment where peers' identity privacy is important, it may conflict with trustworth... Trust is one of the most important security requirements in the design and implementation of peer-to-peer (P2P) systems. In an environment where peers' identity privacy is important, it may conflict with trustworthiness that is based on the knowledge related to the peer's identity, while identity privacy is usually achieved by hiding such knowledge. A trust model based on trusted computing (TC) technology was proposed to enhance the identity privacy of peers during the trustworthiness evaluation process between peers from different groups. The simulation results show that, the model can be implemented in an efficient way, and when the degree of anonymity within group (DAWG) is up to 0.6 and the percentage of malicious peers is up to 70%7 the service selection failure rate is less than 0.15. 展开更多
关键词 PEER-TO-PEER trust model trusted computing direct anonymous attestation pseudonym
下载PDF
Integrated criteria for covert channel auditing
4
作者 Chang-da WANG Shi-guang JU 《Journal of Zhejiang University-Science A(Applied Physics & Engineering)》 SCIE EI CAS CSCD 2008年第6期737-743,共7页
A new concept, the security level difference of a covert channel, is presented, which means the security level span from the sender to the receiver of the covert channel. Based on this, the integrated criteria for cov... A new concept, the security level difference of a covert channel, is presented, which means the security level span from the sender to the receiver of the covert channel. Based on this, the integrated criteria for covert channel auditing are given. Whereas TCSEC (Trusted Computer System Evaluation Criteria) or CC (Common Criteria for Information Technology Security Evaluation) only use the bandwidth to evaluate the threat of covert channels, our new criteria integrate the security level difference, the bandwidth sensitive parameter, bandwidth, duration and instantaneous time of covert channels, so as to give a comprehensive evaluation of the threat of covert channels in a multilevel security system. 展开更多
关键词 Multilevel security Covert channel Covert channel auditing
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部