期刊文献+

主流平台中的可信路径安全机制分析

Trusted Path Security Mechanisms Analysis in the Mainstream Platform
下载PDF
导出
摘要 分析了可信路径及其基本的密切相关概念的内涵,阐释了主流平台中Linux、NT系列windows中的可信路径的基本原理。将目前针对Linux、windows两类主流平台的可信路径的主要攻击手段进行了试验,对该两类平台的可信路径的渗透情况作了试验并进行了对比分析。使用计算机信息系统安全等级保护中的有关指标对该Linux、NT系列windows的可信路径安全机制做了对比。 Trusted path and its basic conception are analyzed. The principle of trusted path in the mainstream platform is expounded. The main attack means at trusted path in the mainstream platform (Linux and windows) is exercised. The status of infiltrated through trusted path is discussed. Trusted path security mechanisms of Linux and trusted path security mechanisms of windows are contrasted according to operating system technology requirement in computer information system security protection.
作者 李红霞 傅鹂
出处 《微计算机信息》 北大核心 2006年第06X期97-99,共3页 Control & Automation
基金 重庆市自然科学基金资助项目基金编号:CSTC2005BA2002
关键词 可信路径 可信计算基 安全留意键 安全警告序列 渗透 trusted path,Trusted Computing Base, Secure Attention Key, Infiltration
  • 相关文献

参考文献7

  • 1中国国家技术监督局.中华人民共和国国家标准:计算机信息系统安全保护等级划分准则GB17859—19991999.
  • 2吴曦,蒋烈辉.蓝牙底层安全机制研究与实现[J].微计算机信息,2005,21(07X):87-89. 被引量:9
  • 3Cynthia irvine, David Shifflett, Paul Clark, Timothy Levin,George Dinoh: MYSEA Technology Demonstration, Naval Postgraduate School, April 2003
  • 4Department of Defense Trusted Computer System Evaluation Criteria, DoD 5200.28-STD. Fort Meade, MD. National Computer Security Center, December 1985.
  • 5United States Patent 4918653, "Trusted path mechanism for an operating system"
  • 6Stuart McClure, Joel Scambray, George Kurtz, Foundstone Company, Hacking Exposed
  • 7Goguen J A,Meseguer J. Security Policy and Security Models. In Proceedings of the 1982 IEEE Symposium on Security and Privacy 1982

二级参考文献3

  • 1Specification of the Bluetooth,vol.1.1,Feb.2001;www.Bluetooth.com/dev/specifications.asp.
  • 2J.L.Massey,G.H.Khachatrian,and M.K. Kuregian,“Nomination of SAFER + as CandidateAlgorithm for the Advance EncryptionStandard,”Proc. 1st Advanced Encryption Standard Candidate Conf.1998.
  • 3BruceSchneier[美].“Applied Cryptography:protocols,algorithms,and source code in C”[M].北京机械工业出版社,2001.185-212.

共引文献8

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部