期刊文献+

文件运动轨迹追踪技术的研究及实现

Design and Implementation of Tracing File Trajectory
在线阅读 下载PDF
导出
摘要 详细阐述了文件运动轨迹追踪技术的实现方法,并提供基于该技术的文件运动轨迹追踪系统的解决方案。利用Windows文件系统过滤驱动对文件透明加密,并追踪文件运动轨迹。追踪文件离开工作安全域后,无法使用;在工作安全域内,只允许满足安全策略的进程操作追踪文件,其他进程则拒绝访问。对追踪文件的任何操作,文件运动轨迹追踪系统均记录日志并上传至服务器,既保证实时监控文件流向,杜绝危险性的操作,又便于以后对操作信息进行统计分析和审计。 In this article,the implementation of tracing file trajectory is described in details. The solution of the tracing system based on tracing file trajectory is also provided. Taking advantages of transparent encrypt,which is based on the windows file system filter driver,the file trajectory is tracing as follows:the file is unable to be accessed once the tracing file is taken out of the working security domain. Only when the file in the security domain and the process is secure at the same time,it can be accessed by the handler. The tracing system will record all information about the operations on the file,besides log of the submission to the server. According to the processes above,the file trajectory is tracing on time,and hence can put an end to the dangerous operations. It is convenient to analyze and audit the results.
作者 王文宇
出处 《计算机系统应用》 2010年第4期127-132,共6页 Computer Systems & Applications
关键词 文件系统过滤驱动 透明加密 运动轨迹 追踪 审计 file system filter driver transparent encrypt trajectory tracing audit
  • 相关文献

参考文献5

二级参考文献15

  • 1陈尚义,刘胜平,赵泰.基于防水墙系统的信息安全与保密解决方案[J].信息安全与通信保密,2006(7):50-52. 被引量:4
  • 2[1]中国软件与技术服务股份有限公司.中软防水墙系统介绍[Z].2007.
  • 3[2]黄敏.内网安全的发展趋势[C].第六届中国信息安全发展趋势与战略高层研讨会论文集,2006.
  • 4SCHNEIERB 吴世忠 祝世雄 张文政译.应用密码学—协议、算法与C源程序[M].北京:机械工业出版社,2000..
  • 5尤晋元 史美林.Windows操作系统原理[M].北京:机械工业出版社,2003..
  • 6Stephen D Wolthusen.Security Policy Enforcement at the File System Level in the Windows NT Operating System Family[C].In:Computer Security Applications Conference,Proceedings 2001,17th Annual,2001
  • 7Cynthia E Irvine. A Multilevel File System for High Assurance[C].In: Security and Privacy,1995 Proceedings ,1995 IEEE Symposium on
  • 8D Solomn,M Russinovich.Inside Windows 2000[M].3rd edition,Microsoft Press, Bellevue, 2000
  • 9Myong H Kang,Judith N Froscher,Brian J Eppinger. Towards an Infrastxucture for MLS Distributed Computing[C].In:Computer SecurityApplication Conference, 14th Annual, 1998
  • 10Glenn Pittaway. Distributed Security Services in Microsoft Windows 2000(Windows NT5.0):Protecting Data in the Enterprise[R].Information Security Technical Report,3(4)

共引文献49

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部