• 综合
  • 标题
  • 关键词
  • 摘要
  • 学者
  • 期刊-刊名
  • 期刊-ISSN
  • 会议名称
搜索

作者:

Zhao, Yong (Zhao, Yong.) | Han, Zhen (Han, Zhen.) | Liu, Ji-Qiang (Liu, Ji-Qiang.) | Shen, Chang-Xiang (Shen, Chang-Xiang.)

收录:

EI Scopus PKU CSCD

摘要:

In the current application environment architecture, there is no clear borderline between the applications, which can share resource, communicate with and call each other. As a result, the malicious code, such as virus, trogan horse and so on, can intrude to the system easily. Therefore, it's hard to verify and guarantee the trustworthy of application. An application-isolated model was proposed, in which every application has some private resources, whose security was guaranteed by itself, and the application can just communicate with outside in the way of reading the corresponding application's private resource. At the end, it's proved that this architecture can not only enhance the information system's security, but also get trust measurement and remote attestation much more easy.

关键词:

Security of data Information systems

作者机构:

  • [ 1 ] [Zhao, Yong]School of Computer Information and Technology, Beijing Jiaotong University, Beijing 100044, China
  • [ 2 ] [Han, Zhen]School of Computer Information and Technology, Beijing Jiaotong University, Beijing 100044, China
  • [ 3 ] [Liu, Ji-Qiang]School of Computer Information and Technology, Beijing Jiaotong University, Beijing 100044, China
  • [ 4 ] [Shen, Chang-Xiang]School of Computer Information and Technology, Beijing University of Technology, Beijing 100022, China

通讯作者信息:

电子邮件地址:

查看成果更多字段

相关关键词:

相关文章:

来源 :

Journal on Communications

ISSN: 1000-436X

年份: 2007

期: SUPPL.

卷: 28

页码: 125-129

被引次数:

WoS核心集被引频次:

SCOPUS被引频次:

ESI高被引论文在榜: 0 展开所有

万方被引频次:

中文被引频次:

近30日浏览量: 1

在线人数/总访问数:216/3932583
地址:北京工业大学图书馆(北京市朝阳区平乐园100号 邮编:100124) 联系我们:010-67392185
版权所有:北京工业大学图书馆 站点建设与维护:北京爱琴海乐之技术有限公司