首页 | 本学科首页   官方微博 | 高级检索  
     

基于可信计算技术的抗恶意代码攻击模型
引用本文:岳阳,郑志蓉,徐昆.基于可信计算技术的抗恶意代码攻击模型[J].通信技术,2020(4):998-1003.
作者姓名:岳阳  郑志蓉  徐昆
作者单位:91977部队
摘    要:通过对恶意代码攻击过程的分析,针对恶意代码攻击的类型手段,研究信任链传递技术、基于密码的安全隔离技术、多级安全访问控制技术以及安全管道域技术。信任链传递技术解决可信计算基不能被篡改的问题,基于密码的安全隔离技术解决可信计算基不能被绕过的问题,多级安全访问控制技术解决普通用户信息交互的完整性和保密性问题,安全管道域技术解决特权用户使用资源的范围问题。最后,在此基础上构建基于可信计算技术的抗恶意代码攻击模型,并分析该模型的效能。

关 键 词:可信计算  抗恶意代码攻击  信任链传递  安全隔离  多级安全访问控制  安全管道域

Anti-Malicious Code Attack Model based on Trusted Computing Technology
YUE Yang,ZHENG Zhi-rong,XU Kun.Anti-Malicious Code Attack Model based on Trusted Computing Technology[J].Communications Technology,2020(4):998-1003.
Authors:YUE Yang  ZHENG Zhi-rong  XU Kun
Affiliation:(Unit 91977 of PLA,Beijing 100841,China)
Abstract:Through the analysis of the malicious code attack process,and aiming at the types and means of malicious code attacks,exploration is done on trust chain transfer technology,password-based security isolation technology,multi-level security access control technology and security pipeline domain technology.Trust chain transfer technology solves the problem that the trusted computing base cannot be tampered with;password-based security isolation technology solves the problem that the trusted computing base cannot be bypassed;multi-level security access control technology solves the problem of the integrity and confidentiality of information interaction of ordinary users;the security pipeline domain technology solves the problem of the range of resources used by privileged users.Finally,on this basis,an anti-malicious code attack model based on trusted computing technology is constructed,and the effectiveness of the model also analyzed.
Keywords:trusted computing  anti-malicious code attack  trust chain transfer  security isolation  multilevel security access control  security pipeline domain
本文献已被 维普 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号