期刊文献+

基于虚拟化的多网安全办公系统研究与设计 被引量:5

Design and Research of Multiple Network Security Office System Based on Virtualization
下载PDF
导出
摘要 信息化程度的不断提高,使得各部门在完成正常办公业务时通常都需要访问多个不同安全域网络,如内部办公网、外部办公网、互联网等。针对用户多网办公存在的安全问题,提出基于虚拟化的多网安全办公技术研究。通过引入受控策略、安全策略、可信策略等关键策略,实现信息单向导入、外设管控、虚拟机间信息受控拷贝、可信启动、透明存储加密等功能。最后给出安全办公原型系统,结果表明该系统在保证系统正常运行效率的同时能有效满足用户多网办公的安全需求。 With the constant improvement of the degree of informatization,departments usually need to access different network to complete normal office business,such as the internal office network,external office network and Internet.In order to solve the security problem of multiple network office,the multiple network office terminal based on virtualization technology was proposed.By introducing key strategies,such as control strategy,security policy and credible strategy,the function of information one-way import,peripheral control,information controlled copies between virtual machine,trusted startup and transparent storage encryption can be realized.
出处 《科学技术与工程》 北大核心 2014年第22期240-244,274,共6页 Science Technology and Engineering
基金 国家自然科学基金项目(61072047)资助
关键词 虚拟化 多网办公 可信启动 信息受控 virtualization multiple network office trusted startup controlled information
  • 相关文献

参考文献9

二级参考文献46

  • 1张焕国,罗捷,金刚,朱智强,余发江,严飞.可信计算研究进展[J].武汉大学学报(理学版),2006,52(5):513-518. 被引量:114
  • 2Sekar R, Venkatakrishnan V N. One-way Isolation: An Effective Approach for Realizing Safe Execution Environments[C]//Proc. of the ISOC Network and Distributed Systems Symposium. San Diego California, USA: [s. n.], 2005.
  • 3Nanda S, Lain L, Chiueh T. A Feather-weight Virtual Machine for Windows Applications[C]//Proc. of the 2nd Int'l Conf. on Virtual Execution Environments. Ottawa, Canada: [s. n.], 2006.
  • 4Keahey K, Doering K, Foster I. From Sandbox to Playground: Dynamic Virtual Environments in the Grid[C]//Proc. of the 5th IEEE/ACM Int'l Workshop on Grid Computing. Pittsburgh, USA: [s. n.], 2004.
  • 5Forrest S, Hofmeyr S A, Somayaji A, et al. A Sense of Self for Unix Processes[C]//Proc. of the 1996 IEEE Symposium on Security and Privacy. [S. l.]: IEEE Computer Society, 1996.
  • 6Ristenpart T. Back to the Future: A Framework for Automatic Malware Removal and System Repair[C]//Proc. of the Annual Computer Security Applications Conference. Miami, FL, USA: IEEE Computer Society, 2006.
  • 7John Heasman.Implementing and Detecting an ACPI BIOS Rootkit[EB/OL].2005.http://www.blackhat.com.
  • 8Hacking Grub for fun and profit[OL].2005.http://www.phrack.org.
  • 9William A Arbaugh,David J Farber,Jonathan M Smith.A Secure and Reliable Bootstrap Architecture[C]//In Proceedings 1997 IEEE Symposium on Security and Privacy.
  • 10Reiner Sailer,Xiaolan Zhang,Trent Jaeger,et al.Design and Implementation of a TCB-based Integrity Measurement Architecture[C]//The 13 th Usenix Security Symposium.2004.

共引文献20

同被引文献68

引证文献5

二级引证文献8

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部