首页 | 本学科首页   官方微博 | 高级检索  
     

基于硬件的计算机安全策略
引用本文:匡春光,崔益民,张鲁峰,张剑波.基于硬件的计算机安全策略[J].微处理机,2011,32(1):89-91.
作者姓名:匡春光  崔益民  张鲁峰  张剑波
作者单位:北京系统工程研究所信息系统安全技术国家级重点实验室,北京,100101
摘    要:计算机的安全问题日益突出,相应地,对计算机安全的研究也越来越受到重视,但目前对计算机安全的研究主要集中在软件方面,为了更有效地提高计算机的安全,对基于硬件的计算机安全进行了研究。应用分类的研究方法,较系统地提出了基于硬件的计算机安全策略,首先从计算机硬件的各个组成部分出发,分析如何提高计算机的安全,然后分析各组成部分如何协调一致。研究结果可以作为计算机安全策略的一部分,用于指导如何提高计算机的安全。

关 键 词:硬件  安全  安全策略  微处理器  密码学

Hardware Based Computer Security Policy
KUANG Chun-guang,CUI Yi-min,ZHANG Lu-feng,ZHANG Jian-bo.Hardware Based Computer Security Policy[J].Microprocessors,2011,32(1):89-91.
Authors:KUANG Chun-guang  CUI Yi-min  ZHANG Lu-feng  ZHANG Jian-bo
Affiliation:KUANG Chun-guang,CUI Yi-min,ZHANG Lu-feng,ZHANG Jian-bo(National Key Laboratory of Science and Technology on Information System Security,Beijing Institute of System Engineering,Beijing 100101,China)
Abstract:Computer security problems are getting more and more prominent,accordingly,research of computer security is becoming more and more important.But current research of computer security centralizes on software.In order to improve the level of computer security more effectively,hardware based computer security is studied.Using classification method,hardware based computer security policy is provided.First,computer hardware components are analyzed to decide how to improve computer security,then,cooperation of al...
Keywords:Hardware  Security  Security policy  Processor  Cryptography  
本文献已被 CNKI 万方数据 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号