期刊文献+
共找到4篇文章
< 1 >
每页显示 20 50 100
铁路计算机联锁系统安全关键软件的安全性能建模方法 被引量:3
1
作者 李耀 张亚东 +3 位作者 郭进 晏姗 饶畅 曹雅鑫 《中国铁道科学》 EI CAS CSCD 北大核心 2017年第2期111-117,共7页
针对现有建模方法不能同时满足铁路信号系统安全关键软件安全功能和安全性能建模的需求,在建模语言SyncCharts的状态和变迁中增加转移频数和失效后果严重度2个参数,提出频率风险SyncCharts建模方法。定义频率风险状态转移图,在此基础上... 针对现有建模方法不能同时满足铁路信号系统安全关键软件安全功能和安全性能建模的需求,在建模语言SyncCharts的状态和变迁中增加转移频数和失效后果严重度2个参数,提出频率风险SyncCharts建模方法。定义频率风险状态转移图,在此基础上给出频率风险SyncCharts的定义、约束条件和宏步规则;依据将频率风险SyncCharts结构转化为马尔可夫决策过程(MDP)结构的规则,给出将频率风险SyncCharts转化为MDP的算法;通过MDP的模型分析方法实现频率风险SyncCharts的模型分析。以铁路计算机联锁系统中信号请求子系统安全关键软件为例,采用频率风险SyncCharts建模方法和模型分析方法,建立该子系统的安全性能分析模型,分析该子系统的激活概率和风险等级2个安全性能指标,定量描述该子系统关键软件的安全性能。 展开更多
关键词 铁路信号系统 软件安全性能 SyncCharts建模 马尔可夫决策过程
下载PDF
档案信息化的安全隐患及其对策分析 被引量:6
2
作者 何桂英 《电脑与电信》 2010年第5期41-42,44,共3页
随着计算机网络技术和企业信息化的迅速发展,档案信息化也呈现迅猛发展之势。在档案信息化过程中,面临着不少信息安全的隐患,如硬件软件的缺陷、病毒侵害、人的恶意攻击、操作人员的无意失误等。分析了档案信息化面临的安全问题,并从硬... 随着计算机网络技术和企业信息化的迅速发展,档案信息化也呈现迅猛发展之势。在档案信息化过程中,面临着不少信息安全的隐患,如硬件软件的缺陷、病毒侵害、人的恶意攻击、操作人员的无意失误等。分析了档案信息化面临的安全问题,并从硬件、软件、制度三方面给出了应对这些安全问题的方法。 展开更多
关键词 档案信息化 安全隐患 软件缺陷 安全防范体系 软件安全性能 安全制度
下载PDF
Software Composition of Different Security Level Components 被引量:1
3
作者 Frank Tsui Edward Jung Sheryl Duggins 《Computer Technology and Application》 2011年第11期835-842,共8页
In this paper the authors show how software component design can affect security properties through different composition operators. The authors define software composition as the result of aggregating and/or associat... In this paper the authors show how software component design can affect security properties through different composition operators. The authors define software composition as the result of aggregating and/or associating a component to a software system. The component itself may be informational or functional and carry a certain level of security attribute. The authors first show that the security attributes or properties form a lattice structure when combined with the appropriate least upper bound and greatest lower bound type of operators. Three composition operators, named C l, C2 and C3 are developed. The system's security properties resulting from these compositions are then studied. The authors discuss how different composition operators maintain, relax and restrict the security properties. Finally, the authors show that C1 and C2 composition operators are order-sensitive and that C3 is order-insensitive. 展开更多
关键词 Software composition SECURITY component-design.
下载PDF
RECTANGLE: a bit-slice lightweight block cipher suitable for multiple platforms 被引量:28
4
作者 ZHANG WenTao BAO ZhenZhen +3 位作者 LIN DongDai Vincent RIJMEN YANG Bo Han Ingrid VERBAUWHEDE 《Science China Chemistry》 SCIE EI CAS CSCD 2015年第12期85-99,共15页
In this paper, we propose a new lightweight block cipher named RECTANGLE. The main idea of the design of RECTANGLE is to allow lightweight and fast implementations using bit-slice techniques. RECTANGLE uses an SP-netw... In this paper, we propose a new lightweight block cipher named RECTANGLE. The main idea of the design of RECTANGLE is to allow lightweight and fast implementations using bit-slice techniques. RECTANGLE uses an SP-network. The substitution layer consists of 16 4 × 4 S-boxes in parallel. The permutation layer is composed of 3 rotations. As shown in this paper, RECTANGLE offers great performance in both hardware and software environment, which provides enough flexibility for different application scenario. The following are3 main advantages of RECTANGLE. First, RECTANGLE is extremely hardware-friendly. For the 80-bit key version, a one-cycle-per-round parallel implementation only needs 1600 gates for a throughput of 246 Kbits/s at100 k Hz clock and an energy efficiency of 3.0 p J/bit. Second, RECTANGLE achieves a very competitive software speed among the existing lightweight block ciphers due to its bit-slice style. Using 128-bit SSE instructions,a bit-slice implementation of RECTANGLE reaches an average encryption speed of about 3.9 cycles/byte for messages around 3000 bytes. Last but not least, we propose new design criteria for the RECTANGLE S-box.Due to our careful selection of the S-box and the asymmetric design of the permutation layer, RECTANGLE achieves a very good security-performance tradeoff. Our extensive and deep security analysis shows that the highest number of rounds that we can attack, is 18(out of 25). 展开更多
关键词 lightweight cryptography block cipher design bit-slice hardware efficiency software efficiency
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部