首页 | 本学科首页   官方微博 | 高级检索  
     检索      

Protecting Terminals by Security Domain Mechanism Based on Trusted Computing
作者姓名:ZHOU  Zheng  ZHANG  Jun  LI  Jian  LIU  Yi
作者单位:[1]College of Electrical and Information Engineering, Naval University of Engineering, Wuhan 430033, Hubei, China [2]Institute of Electronic Technology, Information Engineering University, Zhengzhou 450002, Henan, China [3]Naval Institute of Computing Technology, Beijing 100841, China
基金项目:Supported by the National High-Technology Research and Development Program of China (2002AA1Z2101)
摘    要:0 IntroductionEventhoughsignificant achievement has been madeinre-search of characteristic and abnormal actions of comput-er virus and attack, the investigation of defending the un-known computer virus and attackis progressing much slower .Under the conditions that attackers are much clever , newcomputer virus is presented continuously,the difference be-tween computer virus and normal programis less and lessclear ,detecting computer virus and attack will be more andmore difficult .Andto be the…

关 键 词:信任计算  信息安全  攻击免疫性  风险限制  保护终端
文章编号:1007-1202(2006)06-1437-04
收稿时间:2006-05-12

Protecting terminals by security domain mechanism based on trusted computing
ZHOU Zheng ZHANG Jun LI Jian LIU Yi.Protecting Terminals by Security Domain Mechanism Based on Trusted Computing[J].Wuhan University Journal of Natural Sciences,2006,11(6):1437-1440.
Authors:Zhou Zheng  Zhang Jun  Li Jian  Liu Yi
Institution:(1) College of Electrical and Information Engineering, Naval University of Engineering, 430033 Wuhan, Hubei, China;(2) Institute of Electronic Technology, Information Engineering University, 450002 Zhengzhou, Henan, China;(3) Naval Institute of Computing Technology, 100841 Beijing, China
Abstract:Networks are composed with servers and rather larger amounts of terminals and most menace of attack and virus come from terminals. Eliminating malicious code and ac cess or breaking the conditions only under witch attack or virus can be invoked in those terminals would be the most effec tive way to protect information systems. The concept of trusted computing was first introduced into terminal virus immunity. Then a model of security domain mechanism based on trusted computing to protect computers from proposed from abstracting the general information systems. The principle of attack resistant and venture limitation of the model was demonstrated by means of mathematical analysis, and the realization of the model was proposed.
Keywords:trusted computing  security domain mechanism  attack immunity  venture limitation
本文献已被 CNKI 维普 SpringerLink 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号