首页 | 本学科首页   官方微博 | 高级检索  
     

主机系统安全结构研究与实现
引用本文:侯家利,冯能山.主机系统安全结构研究与实现[J].微计算机信息,2010(3).
作者姓名:侯家利  冯能山
作者单位:东莞理工学院计算机学院;
基金项目:广东省科技攻关项目(NO.2009B010800055)
摘    要:网络的开放性、共享性,使计算机主机十分容易遭受到网络的攻击和破坏,主机中的内部数据极不安全,本文提出了一种独立主机的安全系统结构,该结构将主机和网卡设计成两个较为独立的数据处理模块,分别处理内部数据和外部数据,实验结果表明,该方案能确保主机的安全,同时运行效率大大提高。

关 键 词:主机安全结构  安全系统构成与实现  

Research and Implementation on Host System Security Structure
HOU Jia-li FENG Neng-shan.Research and Implementation on Host System Security Structure[J].Control & Automation,2010(3).
Authors:HOU Jia-li FENG Neng-shan
Affiliation:HOU Jia-li FENG Neng-shan(Dept of Computer College,Dongguan University of Technology,Dongguan 523808,China)
Abstract:The openness and sharability of network have made computer easily be attacked and damaged by network data,which keeps the internal data in the host in great danger. Accordingly,this paper puts forward an intelligent NIC's security structure for independent host computer; the host and NIC in the structure are designed as two fairly independent data processing modules,respectively processing internal data and external data. After testing,this structure can ensure the security of the host computer and greatly ...
Keywords:Host security structure  Security system structure and its implementation  
本文献已被 CNKI 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号