期刊文献+

计算机数据安全删除的研究与实现 被引量:3

Study and Implementation of Computer Data Secure Deletion
原文传递
导出
摘要 数据安全是计算机安全问题的核心,存储在计算机上的涉密数据,必须做到安全删除才能防止因被恢复而发生失泄密事件。在介绍了计算机数据存储原理的基础上,详细阐述了当前数据安全删除的原理和方法,分析了覆写安全删除的技术原理,实现了一种基于覆写技术的数据安全删除方法,并给出了程序实现的核心代码。实验证明,该方法对于普通文件具有很强的实用性和可操作性。 Data security is the core of computer security, sensitive data stored in the computer must be, when necessary, safely deleted, thus to prevent the data leakage incurred due to the recovery. This paper, based on the principles of computer data storage, describes in detail the current principles and methods of data secure deletion, analyzes the technical principles of data overwriting, achieves an overwriting-based data secure deletion method and gives the core code. The experiment indicates that this method is of strong practicability and operatability for the ordinary files.
作者 李敏 周安民
出处 《信息安全与通信保密》 2010年第10期73-75,77,共4页 Information Security and Communications Privacy
关键词 安全删除 数据覆写 数据安全 信息安全 secure deletion data overwriting data security information security
  • 相关文献

参考文献4

  • 1卢兴华,刘增良.数据残留与安全删除方法研究[J].微计算机信息,2005,21(11X):11-13. 被引量:3
  • 2尹燕彬,文伟平.计算机数据安全删除和隐私保护[J].信息网络安全,2009(5):55-58. 被引量:8
  • 3GUTMANN Perter. Secure Deletion of Data from Magnetic and Solid-State Memory[C]. San Jose, California: The Sixth USENIX Security Symposium Proceedings, 1996: 22-25.
  • 4GARFINKEL S L. Design Principles and Patterns for Computer Systems that are Simultaneously Secure and Usable[D]. America: Department of Electrical Engineering and Computer Science, 2005.

二级参考文献9

  • 1Simson L. Garfinkel. Design Principles and Patterns for Computer Systems that are Simultaneously Secure and Usable[D]. MASSACHUSETTS INSTITUTE OF TECHNOLOGY,2003.
  • 2侯俊杰.深入浅出MFC(第二版)[M].华中科技大学出版社,2002..
  • 3John R.Mallery.Secure File Deletion:Fact or Fiction?[]..2006
  • 4.DoD5220.22-M National Industry Security Program Operating Manual(NISPOM)[]..1995
  • 5Peter Gutmann.“Secure Deletion of Data from Magnetic and Solid-State Memory”. http://www.cs.auckland.ac.nz/~pgut001/pubs/secure_del.html . 1996
  • 6Dean,Sarah.“Disk and File Shredders:A Comparison.”. http://www.sdean12.org/Comparison_Shredders.htm . 2006
  • 7New Technologies,Inc.“Windows Swap File Defined.”. http://www.forensics-intl.com/def7.html . 2006
  • 8Marcel Lambert.CodeProject A Cleanup API for Windows_Free source code and programming help[]..
  • 9朱珍民,黎慧,魏丕武,吴思.硬盘数据逻辑结构及其数据恢复[J].湘潭大学自然科学学报,2000,22(2):12-16. 被引量:9

共引文献9

同被引文献57

引证文献3

二级引证文献31

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部