• 综合
  • 标题
  • 关键词
  • 摘要
  • 学者
  • 期刊-刊名
  • 期刊-ISSN
  • 会议名称
搜索

作者:

Wang, Guan (Wang, Guan.) | Yan, Zhiwei (Yan, Zhiwei.) | Chen, Jianzhong (Chen, Jianzhong.)

收录:

EI Scopus

摘要:

Network security equipment plays an important role in preventing network security attacks. However, with the change of network environment and the upgrade of network attack means, the protection ability of the security software on the existing network security equipment will gradually decrease with time. For some large organizations or enterprises, their information security operations centers lack attention to software version control and software update processes for network security equipment, resulting in some security crises in the software update process. In this paper, we propose a method for software trusted update on network security equipment. This method can provide trusted identify authentication, secure data transmission and effective software version control. It enables the network security operations centers to more safely manage software update process on network security equipment. This method uses the functions of Trusted Cryptography Module to provide trusted execution environment. In this paper, we had introduced the process design, the prototype design and theoretical analysis to explain the feasibility and safety of this method. © Published under licence by IOP Publishing Ltd.

关键词:

Computer crime Cryptography Learning algorithms Machine learning Network security Process control

作者机构:

  • [ 1 ] [Wang, Guan]Faculty of Information Technology, Beijing University of Technology, Beijing, Beijing; 100124, China
  • [ 2 ] [Wang, Guan]Beijing Key Laboratory of Trusted Computing, Beijing University of Technology, Beijing, Beijing; 100124, China
  • [ 3 ] [Yan, Zhiwei]Faculty of Information Technology, Beijing University of Technology, Beijing, Beijing; 100124, China
  • [ 4 ] [Yan, Zhiwei]Beijing Key Laboratory of Trusted Computing, Beijing University of Technology, Beijing, Beijing; 100124, China
  • [ 5 ] [Chen, Jianzhong]Faculty of Information Technology, Beijing University of Technology, Beijing, Beijing; 100124, China
  • [ 6 ] [Chen, Jianzhong]Beijing Key Laboratory of Trusted Computing, Beijing University of Technology, Beijing, Beijing; 100124, China

通讯作者信息:

  • [wang, guan]beijing key laboratory of trusted computing, beijing university of technology, beijing, beijing; 100124, china;;[wang, guan]faculty of information technology, beijing university of technology, beijing, beijing; 100124, china

电子邮件地址:

查看成果更多字段

相关关键词:

相关文章:

来源 :

ISSN: 1757-8981

年份: 2019

期: 5

卷: 569

语种: 英文

被引次数:

WoS核心集被引频次: 0

SCOPUS被引频次: 1

ESI高被引论文在榜: 0 展开所有

万方被引频次:

中文被引频次:

近30日浏览量: 2

归属院系:

在线人数/总访问数:5635/2966102
地址:北京工业大学图书馆(北京市朝阳区平乐园100号 邮编:100124) 联系我们:010-67392185
版权所有:北京工业大学图书馆 站点建设与维护:北京爱琴海乐之技术有限公司