期刊文献+

基于PCI接口的跨网络安全数据通信模式 被引量:2

Network-Spanned and Secure Data Communication Mode Based on PCI Interface
在线阅读 下载PDF
导出
摘要 目的实现多个网络之间的数据安全传输。方法在两个通讯服务器的PCI插槽上安装我院自主研发的隔离通信卡,通过自定义通讯协议在两台服务器之间进行数据交互。结果在保证原物理隔离安全性的基础上,实现了通讯双方在同一机房的数据交互量小、并发量不大的单链路多信道业务通讯。结论利用PCI接口作为多个网络之间物理隔离方案的通讯机制,在特定的业务方面有较强的可用性。 Objective To implement the secure data transmission between multiple networks. Methods Isolated communication card developed by our hospital is installed in the PCI slot between two communication servers so that data interaction can be implemented between two servers via custom communication protocol. Results The single-link and multichannel data communication with a small amount of data interaction and concurrency between both sides of communication within the same computer room is implemented based on the original physical isolation security. Conclusion The communication mechanism which regards PCI interface as its physical isolation scheme among various networks has strong usability in the aspect of professional work.
出处 《中国医疗设备》 2014年第3期45-47,89,共4页 China Medical Devices
关键词 PCI接口 网络技术 网络安全 物理隔离 PCI interface network technology network security physical isolation
  • 相关文献

参考文献11

二级参考文献58

  • 1方琳,张玉清,马玉祥.信息系统的业务连续性安全管理模型及实施流程[J].计算机工程,2005,31(24):180-182. 被引量:5
  • 2陈晓苏,林植,肖道举.基于策略的网络安全防护系统框架研究[J].计算机工程与科学,2007,29(6):7-9. 被引量:11
  • 3Hoi C, Atallah J M. Protecting software code by guards [G]//LNCS 2320: Proc of DRM Workshop. Berlin: Springer, 2001: 125-141.
  • 4Business Software Alliance. Fifth Annual BSA and IDC Global Software Piracy Study [R/OL]. Washington, DC: Business Software Alliance, 2008. [2010-01-16]. http:// portal. bsa. org/ideglobalstudy2007/studies/2007_global_piracy_ study. pdf.
  • 5Business Software Alliance. Sixth Annual BSA and IDC Global Software Piracy Study [R/OL]. Washington, DC: Business Software Alliance, 2009. [2010-01-16]. http:// portal. bsa. org/globalpiracy2008/studies/globalpiracy2008. pdf.
  • 6David L, Thekkath C, Mitchell M, et al. Architectural support for copy and tamper resistant software [C] //Proc of the 9th Int Conf on Architectural Support for Programming Languages and Operating Systems, New York: ACM, 2000: 168-177.
  • 7Aucsmith D. Tamper Resistant Software : An implementation [G]//LNCS 1174: Proc of the 1st Int Workshop on Information Hiding. Berlin: Springer, 1996: 317-333.
  • 8Bryant E D, Atallah M J, Stytz M R. A Survey of Anti-tamper Technologies [J]. CrossTalk: The Journal of Defense Software Engineering, 2004, 17(11): 12-16.
  • 9Gleb N, Nasir M. Preventing piracy, reverse engineering, and tampering[J]. IEEE Computer, 2003, 36(7): 64-71.
  • 10Collberg C, Thomborson C. Watermarking, tamper-proofing, and obfuscation-tools for software protection [J]. IEEE Trans on Software Engineering, 2002, 28(8) : 735-746.

共引文献79

同被引文献19

引证文献2

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部