首页 | 本学科首页   官方微博 | 高级检索  
     

Protecting Terminals by Security Domain Mechanism Based on Trusted Computing
引用本文:ZHOU Zheng ZHANG Jun LI Jian LIU Yi. Protecting Terminals by Security Domain Mechanism Based on Trusted Computing[J]. 武汉大学学报:自然科学英文版, 2006, 11(6): 1437-1440. DOI: 10.1007/BF02831792
作者姓名:ZHOU Zheng ZHANG Jun LI Jian LIU Yi
作者单位:[1]College of Electrical and Information Engineering, Naval University of Engineering, Wuhan 430033, Hubei, China [2]Institute of Electronic Technology, Information Engineering University, Zhengzhou 450002, Henan, China [3]Naval Institute of Computing Technology, Beijing 100841, China
基金项目:Supported by the National High-Technology Research and Development Program of China (2002AA1Z2101)
摘    要:
0 IntroductionEventhoughsignificant achievement has been madeinre-search of characteristic and abnormal actions of comput-er virus and attack, the investigation of defending the un-known computer virus and attackis progressing much slower .Under the conditions that attackers are much clever , newcomputer virus is presented continuously,the difference be-tween computer virus and normal programis less and lessclear ,detecting computer virus and attack will be more andmore difficult .Andto be the…

关 键 词:信任计算 信息安全 攻击免疫性 风险限制 保护终端
文章编号:1007-1202(2006)06-1437-04
收稿时间:2006-05-12

Protecting terminals by security domain mechanism based on trusted computing
Zhou Zheng,Zhang Jun,Li Jian,Liu Yi. Protecting terminals by security domain mechanism based on trusted computing[J]. Wuhan University Journal of Natural Sciences, 2006, 11(6): 1437-1440. DOI: 10.1007/BF02831792
Authors:Zhou Zheng  Zhang Jun  Li Jian  Liu Yi
Affiliation:(1) College of Electrical and Information Engineering, Naval University of Engineering, 430033 Wuhan, Hubei, China;(2) Institute of Electronic Technology, Information Engineering University, 450002 Zhengzhou, Henan, China;(3) Naval Institute of Computing Technology, 100841 Beijing, China
Abstract:
Networks are composed with servers and rather larger amounts of terminals and most menace of attack and virus come from terminals. Eliminating malicious code and ac cess or breaking the conditions only under witch attack or virus can be invoked in those terminals would be the most effec tive way to protect information systems. The concept of trusted computing was first introduced into terminal virus immunity. Then a model of security domain mechanism based on trusted computing to protect computers from proposed from abstracting the general information systems. The principle of attack resistant and venture limitation of the model was demonstrated by means of mathematical analysis, and the realization of the model was proposed.
Keywords:trusted computing   security domain mechanism   attack immunity   venture limitation
本文献已被 CNKI 维普 SpringerLink 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号