首页 | 本学科首页   官方微博 | 高级检索  
     

涉密网资源监控体系的研究与实现
引用本文:李焕洲,张健,陈麟.涉密网资源监控体系的研究与实现[J].计算机应用,2006,26(5):1090-1092.
作者姓名:李焕洲  张健  陈麟
作者单位:四川师范大学,物理与电子工程学院,四川,成都,610068;四川大学,信息安全研究所,四川,成都,610064;四川师范大学,物理与电子工程学院,四川,成都,610068
摘    要:为构建涉密网资源监控体系,分析了涉密网内部的违规操作行为,介绍了涉密信息的泄露方式。以涉密机软/硬件资源的使用为监控目标,对涉密信息的泄露进行阻止。基于该监控体系,对原型机的组成及软件结构进行设计并实现,特别对原型机使用的安全策略的制定、派发和应用过程做出详细的说明。

关 键 词:涉密信息  涉密网  涉密机  资源监控体系
文章编号:1001-9081(2006)05-1090-03
收稿时间:2005-11-21
修稿时间:2005-11-212006-02-06

Research and implementation on resource monitoring architecture of secret-associated network
LI Huan-zhou,ZHANG Jian,CHEN Lin.Research and implementation on resource monitoring architecture of secret-associated network[J].journal of Computer Applications,2006,26(5):1090-1092.
Authors:LI Huan-zhou  ZHANG Jian  CHEN Lin
Affiliation:1. College of Physics and Electronic Engineering, Sichuan Normal University, Chengdu Sichuan 610068, China; 2. Information Security Institute, Sichuan University, Chengdu Sichuan 610064, China
Abstract:To establish the resource monitoring architecture of secret-associated network, the internal deregulation operations in secret-associated network was analyzed, and the ways about leaking the secret information was introduced. Based on the research, the leaking of secret-associated information can be prevented by real time monitoring usage of software or hardware resource of secret-associated compute. The prototype system's components and software structure were designed and implemented, which are based on the resource monitoring architecture proposed. Specially, the establishment, assignability and application of the security policy were described in the paper.
Keywords:secret-associated information  secret-associated network  secret-assoclated computer  resource monitoring architecture
本文献已被 CNKI 维普 万方数据 等数据库收录!
点击此处可从《计算机应用》浏览原始摘要信息
点击此处可从《计算机应用》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号