基于可信密码模块的数据安全管理系统关键技术分析-key technology analysis of data security management system based on trusted cryptographic module.docxVIP
- 1、原创力文档(book118)网站文档一经付费(服务费),不意味着购买了该文档的版权,仅供个人/单位学习、研究之用,不得用于商业用途,未经授权,严禁复制、发行、汇编、翻译或者网络传播等,侵权必究。。
- 2、本站所有内容均由合作方或网友上传,本站不对文档的完整性、权威性及其观点立场正确性做任何保证或承诺!文档内容仅供研究参考,付费前请自行鉴别。如您付费,意味着您自己接受本站规则且自行承担风险,本站不退款、不进行额外附加服务;查看《如何避免下载的几个坑》。如果您已付费下载过本站文档,您可以点击 这里二次下载。
- 3、如文档侵犯商业秘密、侵犯著作权、侵犯人身权等,请点击“版权申诉”(推荐),也可以打举报电话:400-050-0827(电话支持时间:9:00-18:30)。
- 4、该文档为VIP文档,如果想要下载,成为VIP会员后,下载免费。
- 5、成为VIP后,下载本文档将扣除1次下载权益。下载后,不支持退款、换文档。如有疑问请联系我们。
- 6、成为VIP后,您将拥有八大权益,权益包括:VIP文档下载权益、阅读免打扰、文档格式转换、高级专利检索、专属身份标志、高级客服、多端互通、版权登记。
- 7、VIP文档为合作方或网友上传,每下载1次, 网站将根据用户上传文档的质量评分、类型等,对文档贡献者给予高额补贴、流量扶持。如果你也想贡献VIP文档。上传文档
查看更多
基于可信密码模块的数据安全管理系统关键技术分析-key technology analysis of data security management system based on trusted cryptographic module
国防科学技术大学研究生院硕士学位论文
第 i 页
摘 要
随着数字化、信息化进程的发展,计算机中数据的安全性问题越来越得到人 们的重视。信息化程度越高,业务对信息系统的依赖性就越强,数据的重要性也 越高。能否有效保存、读取、保护好这些数据,越来越成为业务稳定和发展的关 键因素。传统的信息安全系统主要由防火墙、反病毒软件和入侵检测系统构成, 虽然能在一定程度上阻止病毒、木马的入侵,防止数据泄漏,但传统的信息安全 系统是以防外为重点,缺乏对数据本身的保护。
可信计算的研究兴起为我们解决重要数据的安全管理提供了好的解决思路。 可信计算指一个可信的组件,操作或过程的行为在任意操作条件下是可预测的, 并能很好地抵抗不良代码和一定的物理干扰造成的破坏。可信计算提供的安全功 能有:终端设备认证、数据完整性校验、用户身份认证、用户权限合法性、端口 控制和管理、数据的加密存储、重要信息的硬件保护等。在数据安全管理系统中 引入可信计算的思想,能够从源头上保护重要数据的安全,最大程度的防止失泄 密事件的发生。
本课题在可信硬件(可信密码模块)的支持上,通过设计相关软件系统(数 据安全管理系统),确保整个内网系统的数据安全。通过服务端可信启动,确保 服务端可信;通过基于过滤驱动的文件系统保护模块,实现客户端可信登陆、应 用程序运行可信,确保客户端重要数据的安全;通过可信磁盘模块,实现内外磁 盘划分,确保移动存储介质可信。
关键词:数据安全,可信计算,过滤驱动,磁盘保护。
第 ii 页
ABSTRACT
With the development of process of digital and information, the security issues of data in computer have been paid more and more attention. The more the degree of informatinization, the more that business rely on information system and therefore the higher the importance of data. Whether these data can be effectively saved, read, and protected become the key factor of business stability and development. Traditional information security system mainly consists of firewall, anti-virus software and intrusion detection system. Although traditional information security system can prevent the invasions of virus and Trojan in some condition, it is to prevent threaten outside and lack of the protection of data itself.
Rise of the research of trusted computing provides a good idea to solve security management of critical data. Trusted Computing refers to a trusted component, which means behavior of operation and process is predictable in any condition and can very well resist damage caused by bad code or some physical disturbance. The security features that Trusted Computing provides are: Terminal Authentication, Data Integrity Verification, User Authentication, User Rights Legitimacy, Port Control and Management, Data Encrypted Storage, and Hardware Protection of Critical Information. Trusted Computing embeded in data security manageme
您可能关注的文档
- 基于可持续视角的旅游用地模式分析——以乌鲁木齐南山风景区为例-analysis of tourism land pattern based on sustainable perspective - taking nanshan scenic spot in urumqi as an example.docx
- 基于可持续视角的旅游用地模式研究——以乌鲁木齐南山风景区为例-study on tourism land pattern based on sustainable perspective - taking nanshan scenic spot in urumqi as an example.docx
- 基于可持续发展理念城市老工业园的更新改造——以慈湖经济开发区为例-renovation of old urban industrial parks based on the concept of sustainable development - taking cihu economic development zone as an example.docx
- 基于可持续增长视角的上市公司融资策略分析-analysis of financing strategies of listed companies based on the perspective of sustainable growth.docx
- 基于可分级视频的联合信源信道编码技术分析-analysis of joint source-channel coding technology based on scalable video.docx
- 基于可穿戴计算的设备维护辅助系统自适应用户界面分析-adaptive user interface analysis of equipment maintenance assistance system based on wearable computing.docx
- 基于可见光图像和红外热像融合自发表情识别-spontaneous expression recognition base on fusion of visible light image and infrared thermal image.docx
- 基于可穿戴计算的设备维护协同作业支撑系统分析-analysis of equipment maintenance cooperative work support system based on wearable computing.docx
- 基于可竞争市场理论的输电市场管制机制设计-design of transmission market control mechanism based on contestable market theory.docx
- 基于可纠错编码的结构光三维测量方法分析-analysis of three-dimensional measurement method of structured light based on error correction coding.docx
- 基于可用性研究的中国民族乐器新形制探索——以古筝交互界面设计为例-exploration of new forms of chinese national musical instruments based on usability research - taking the design of guzheng interactive interface as an example.docx
- 基于可召回机制的航空公司座位存量控制分析-analysis of airline seat stock control based on recall mechanism.docx
- 基于可用性的老年人手机界面设计分析-design and analysis of mobile phone interface for the elderly based on usability.docx
- 基于可理解性分析的商业步行街外部空间结构设计分析——以汉中市万邦时代广场二期商业步行街设计为例-design and analysis of external space structure of commercial pedestrian street based on intelligibility analysis - taking the second phase commercial pedestrian street design of wanba.docx
- 基于可重构处理器的视觉并行处理算子库分析-analysis of visual parallel processing operator library based on reconfigurable processor.docx
- 基于可重构处理器的并行视觉处理算法分析-analysis of parallel visual processing algorithm based on reconfigurable processor.docx
- 基于可重构处理器的视觉处理子系统的分析与设计-analysis and design of vision processing subsystem based on reconfigurable processor.docx
- 基于客户关系管理的保税油供应商营销策略分析——以中石化燃料油销售有限公司为例-marketing strategy analysis of bonded oil suppliers based on customer relationship management - taking sinopec fuel oil sales co., ltd. as an example.docx
- 基于客户导向的综合房地产企业运营管理模式与应用分析-operation and management mode and application analysis of comprehensive real estate enterprises based on customer orientation.docx
- 基于客户端驱动的流媒体自适应传输技术分析-analysis of streaming media adaptive transmission technology based on client driver.docx
文档评论(0)