期刊文献+
共找到1篇文章
< 1 >
每页显示 20 50 100
A Trusted Environment Construction Method for Security-Sensitive Software
1
作者 LI Jing ZHANG Huanguo +1 位作者 ZHAO Bo FANG Lingling 《Wuhan University Journal of Natural Sciences》 CAS 2011年第5期383-390,共8页
This paper presents a trusted-environment construction method based on the underlying hardware.This method aims at protecting the security-sensitive software in the aspects of software loading,running,and storing in t... This paper presents a trusted-environment construction method based on the underlying hardware.This method aims at protecting the security-sensitive software in the aspects of software loading,running,and storing in the general operating system.It extends the trust chain of the traditional trusted computing technology to reach the target software,ensuring trusted loading.The extended memory management mechanism effectively pre-vents memory dumping and memory tampering for the high-sensitivity data.The file monitoring mechanism protects files from vicious operation made by attackers.Flexible-expanded storage environment provides the target software with static storing protection.Experimental system verifies that the method is suitable for general operating system and can effectively protect security-sensitive software with low overhead. 展开更多
关键词 information security trusted computing securitysensitive software trusted environment
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部