Full-Text Search:
Home|Journal Papers|About CNKI|User Service|FAQ|Contact Us|中文
《JOURNAL OF COMPUTER RESEARCH AND DEVELOPMENT》 1996-04
Add to Favorite Get Latest Update

COMPUTER SECURITY AND SECURITY MODEL

Li Jun and Sun Yufang(Institute of Software,Chinese Academy of Sciences,Beijing 100080)  
This paper describes computer security and especially discusses several security models, including finite-state machine model, access matrix model, Bell--Lapadula(BLP)model,and information flow model. Finally, Trojan horses are discussed.
【Fund】: 国家“八五”重点科技攻关项目
【CateGory Index】: TP309
Download(CAJ format) Download(PDF format)
CAJViewer7.0 supports all the CNKI file formats; AdobeReader only supports the PDF format.
【References】
Chinese Journal Full-text Database 9 Hits
1 Mao Lihua;;Under the cloud computing technology to realize the path analysis of network security[J];网络安全技术与应用;2014-06
2 YUAN Hui;Information and Communication Company, State Grid Hubei Electric Power Corporation;;Study of Windows XP System Security Solution after the End of Support[J];电力信息与通信技术;2014-06
3 SHI Wei-cheng1 TAN Liang1,2 ZHOU Ming-tian3(College of Computer,Sichuan Normal University,Chengdu 610066,China)1(Institute of Computing Technology,Chinese Academy of Sciences,Beijing 100080,China)2(School of Comp.Sci.& Engn.,Univ.of Electronic Sci.& Tech.of China,Chengdu 610054,China)3;Usage Control Model with the Ability of Character Judging[J];计算机科学;2010-06
4 YUAN Na1,2,XUE Xiao-hong3(1.Wuhan University,Wuhan 430079,China;2.Wuhan Yisheng co,Wuhan 430079,China;3.Network Information Center,Changjiang Wa-ter Resources Commission,Wuhan 430010,China);Access Control Model of Electronic Government Based on Attribute Certificate[J];电脑知识与技术;2008-30
5 LIU Yi-he1,2,HE Wen-xiao1,2(1.Department of Computer and Information Science,Neijiang Teacher's College,Neijiang 641112,P.R.C.;2.Key Lab of Network Application Project Development,Neijiang Teacher's College,Neijiang 641112,P.R.C.);A formal description and verification system of information security[J];西南民族大学学报(自然科学版);2008-04
6 YANG Ling-xin(School of Software,Nanjing University,Nanjing 210008,Jiangsu,China);Analysis on Technology and Improvement Strategy of Database Security[J];河北北方学院学报(自然科学版);2008-02
7 LIU Yi-he(Key Lab of Network Application Project Development //Department of Computer and Information Science,Neijiang Normal University,Neijiang,Sichuan 641112,China);A Formal Description About Identification[J];内江师范学院学报;2008-04
8 CEN Fu-li, BI Hong-jun (School of Electronics and Information Engineering, Beijing jiaotong University, Beijing 100044, China );Research on BLP Model and its Improvements[J];信息安全与通信保密;2007-09
9 LIU Yi-he1,2,SHEN Chang-xiang3(1.Dept.of Computer & Information Science,Neijiang Teachers College,Neijiang Sichuan 641112,China;2.Institute of Information Security,Sichuan University,Chengdu Sichuan 610064,China;3.Computing Technology Research Institute of Navy,Beijing 100841,China);Security Model Based on Role Administration[J];计算机应用研究;2007-05
China Proceedings of conference Full-text Database 1 Hits
1 ZHANG Rubin~1,DENG Yi~2,HUANG Hongwei~2,DU Jun~2 (1.Yunan Science and Technology Communication Center,Kunming 650028,China;2.The Provincial Science and Technology Information Center,Kunming 650051,China);Globalization of the National Information Security System and Strategy—based on the perspective of system[A];[C];2010
【Co-references】
Chinese Journal Full-text Database 10 Hits
1 Wang Laifu,Shen Jun,Jin Huamin(Guangdong Research Institute of China Telecom Co.,Ltd.,Guangzhou 510630,China);Research on Cloud Computing Security[J];电信科学;2010-06
2 Hu Wei Zhong Weilian Huaihua Vocational and Technical College, Huaihua Hunan, 418000;On Cloud Computing the issues of network security[J];中国科技信息;2008-23
3 CHEN Lu1,ZHANG Huanguo1,2,ZHANG Liqiang1,LI Song1,CAI Liang3 1. School of Computer,Wuhan University/Key Laboratory of Aerospace Information Security and Trusted Computing of Ministry of Education,Wuhan 430072,Hubei,China; 2. State Key Laboratory of Software Engineering,Wuhan University,Wuhan 430072,Hubei,China; 3. Department of Information Security,Information Engineering University,Zhengzhou 450004,Henan,China;A Peer-to-Peer Resource Sharing Scheme Using Trusted Computing Technology[J];Wuhan University Journal of Natural Sciences;2008-05
4 ZHANG Yan-hui SUN Ji-long 1.Department of Computer Science,College of Science,Hebei North University,Zhangjiakou 075000,Hebei,China; 2.Road Toll Colleeting Bureau of Zhangjiakou City,Zhangjiakou 075000,Hebei,China;Anti-virus Principles and Restoration Method for Computer after Virus Attack[J];河北北方学院学报(自然科学版);2007-03
5 Chen Jun,Duan Huiliang Network Center,Central South University,Hunan,410083;Research of Deploying Automatic Updates in Campus Network[J];网络安全技术与应用;2007-01
6 ZHANG Hong 1),2) HE Ye-Ping 1),2) SHI Zhi-Guo 1),2) 1) (National Engineering Research Center for Foundational Software, Institute of Software, Chinese Academy of Sciences, Beijing 100080) 2) (Graduate University of the Chinese Academy of Sciences, Beijing 100039);A Delegation Model for Periodicity Constraints-Based DAC[J];计算机学报;2006-08
7 HONG Fan CUI Yong-Quan CUI Guo-Hua FU Cai (College of Computer Science,Huazhong University of Science and Technology,Wuhan 430074);Administrative Usage Control Model for Secure Interoperability between Administrative Domains[J];计算机科学;2006-03
8 XU Zhen+, LI Lan, FENG Deng-Guo (State Key Laboratory of Information Security, Institute of Software, The Chinese Academy of Sciences, Beijing 100080, China);A Constrained Role-Based Delegation Model[J];软件学报;2005-05
9 XU Chang-feng, LIU Ai-jiang, HE Da-ke (Research Institute of Computer Security & Communication Secrecy, Southwest Jiaotong University, Chengdu Sichuan 610031, China);Implementation of PMI Based on Attribute Certificate in Electronic Government Secure Construction[J];计算机应用研究;2004-01
10 HUANG Jian+, QING Si-Han, WEN Hong-Zi [Institute of Software, The Chinese Academy of Sciences, Beijing 100080\ , China)-58.5( )](Engineering and Research Center for Information Security Technology, The Chinese Academy of Sciences, Beijing 100080, China) + Corresponding author: E-mail: stanleyhuangjian@hotmail.com http://www.ercist.ac.cn;Timed Role-Based Access Control[J];软件学报;2003-11
©2006 Tsinghua Tongfang Knowledge Network Technology Co., Ltd.(Beijing)(TTKN) All rights reserved