[1]沈玲玲,盛荷花,钱钢,等.可信安全体系实施的工程化途径[J].南京师范大学学报(工程技术版),2010,10(03):069-73.
 Shen Lingling,Sheng Hehua,Qian Gang.Engineering Approaches to Implementation of Trusted Security System[J].Journal of Nanjing Normal University(Engineering and Technology),2010,10(03):069-73.
点击复制

可信安全体系实施的工程化途径
分享到:

南京师范大学学报(工程技术版)[ISSN:1006-6977/CN:61-1281/TN]

卷:
10卷
期数:
2010年03期
页码:
069-73
栏目:
出版日期:
2010-03-01

文章信息/Info

Title:
Engineering Approaches to Implementation of Trusted Security System
作者:
沈玲玲;盛荷花;钱钢;
南京师范大学管理科学与工程系, 江苏南京, 210097
Author(s):
Shen LinglingSheng HehuaQian Gang
Department of Management Science and Engineering,Nanjing Normal University,Nanjing 210097,China
关键词:
可信安全 可信安全工程化模型 实施途径
Keywords:
trusted secur ity trusted security eng ineer ingm ode l im plem entation approach
分类号:
TP309
摘要:
对建立可信安全体系所面临的问题进行了分析,给出必须在可信安全体系全生命周期中引入工程化、体系化方法的理由.在此基础上提出了基于过程的可信安全工程化模型以及该模型指导下的可信安全基线实施途径,对可信安全工程化进行了有益的探讨.
Abstract:
Th is paper analyzes the problem s o f how to establish trusted secur ity system, and g ives the reasons o f leading eng ineer ing and system aticm e thod into the fu ll life-cycle o f trusted security system. On th is basis, w e propose a pro cessbased m ode l for trusted secur ity system and approaches to Im plem entation trusted security baseline under the gu idance o f the mode l. Trusted secur ity eng inee ring appro ach is usefully d iscussed at last

参考文献/References:

[ 1] Da tta A, Frank lin J, Garg D, et a .l A log ic of secure systems and its applica tion to trusted com puting[ J]. Secur ity and Privacy, IEEE Symposium, 2009, 30: 221-236.
[ 2] M unoz A, M ana A, Serrano D. The ro le of trusted com puting in secure agen tm igration[ C] / / Research Cha llenges in Inform ation Sc ience, Third Internationa l Con ference. Fez, 2009: 255-264.
[ 3] G las B, K limm A, Mu ller-G lase rK D, et a .l Configuration m easurement fo rFPGA-based trusted platfo rm s[ C] / / Proceed ing s o f the 2009 IEEE / IFIP Interna tiona l Symposium on Rapid System Pro to typing. W ash ington DC: IEEE Com pute r Soc ie ty, 2009: 123-129.
[ 4] Zhu Lu, Yu Sheng, Zhang Xing, et a .l Form a l com pa tibility model fo r trusted computing applications[ J] . W uhan Un iversity Jou rnal of Na tura l Sc iences, 2009, 14( 5) : 338-392.
[ 5] 龚敏明, 石志国. 可信计算及其安全性应用研究综述[ J]. 江西师范大学学报: 自然科学版, 2009, 33( 3) : 348-352. Gong M inm ing, Sh i Zh iguo. The research survey of trusted computing and its app lication o f secur ity[ J]. Jou rna l o f Jiangx i No rm alUn iv ers ity: Natural Sc ience Edition, 2009, 33( 3): 348-352. ( in Ch inese)
[ 6] 郑志明, 马世龙, 李未, 等. 软件可信性动力学特征以其演化复杂性[ J]. 中国科学( F辑): 信息科学, 2009, 39( 9): 946-950. Zheng Zhim ing, M a Sh ilong, L iW e,i et a.l K inetics character istic and com plex ity o f evo lution of so ftw are trustw orth iness[ J].Sc ience in Ch ina( F) : Inform ation Science Ed ition, 2009, 39( 9): 946-950. ( in Ch inese)

备注/Memo

备注/Memo:
基金项目: 铁道部信息技术中心专项基金( Y-2009-004 ). 通讯联系人: 沈玲玲, 讲师, 研究方向: 可信安全. E-mail:llshen509@ 163. com
更新日期/Last Update: 2013-04-02