Full-Text Search:
Home|Journal Papers|About CNKI|User Service|FAQ|Contact Us|中文
Add to Favorite Get Latest Update


Li Jun and Sun Yufang(Institute of Software,Chinese Academy of Sciences,Beijing 100080)  
This paper describes computer security and especially discusses several security models, including finite-state machine model, access matrix model, Bell--Lapadula(BLP)model,and information flow model. Finally, Trojan horses are discussed.
【Fund】: 国家“八五”重点科技攻关项目
【CateGory Index】: TP309
Download(CAJ format) Download(PDF format)
CAJViewer7.0 supports all the CNKI file formats; AdobeReader only supports the PDF format.
Chinese Journal Full-text Database 9 Hits
1 Mao Lihua;;Under the cloud computing technology to realize the path analysis of network security[J];网络安全技术与应用;2014-06
2 YUAN Hui;Information and Communication Company, State Grid Hubei Electric Power Corporation;;Study of Windows XP System Security Solution after the End of Support[J];电力信息与通信技术;2014-06
3 SHI Wei-cheng1 TAN Liang1,2 ZHOU Ming-tian3(College of Computer,Sichuan Normal University,Chengdu 610066,China)1(Institute of Computing Technology,Chinese Academy of Sciences,Beijing 100080,China)2(School of Comp.Sci.& Engn.,Univ.of Electronic Sci.& Tech.of China,Chengdu 610054,China)3;Usage Control Model with the Ability of Character Judging[J];计算机科学;2010-06
4 YUAN Na1,2,XUE Xiao-hong3(1.Wuhan University,Wuhan 430079,China;2.Wuhan Yisheng co,Wuhan 430079,China;3.Network Information Center,Changjiang Wa-ter Resources Commission,Wuhan 430010,China);Access Control Model of Electronic Government Based on Attribute Certificate[J];电脑知识与技术;2008-30
5 LIU Yi-he1,2,HE Wen-xiao1,2(1.Department of Computer and Information Science,Neijiang Teacher's College,Neijiang 641112,P.R.C.;2.Key Lab of Network Application Project Development,Neijiang Teacher's College,Neijiang 641112,P.R.C.);A formal description and verification system of information security[J];西南民族大学学报(自然科学版);2008-04
6 YANG Ling-xin(School of Software,Nanjing University,Nanjing 210008,Jiangsu,China);Analysis on Technology and Improvement Strategy of Database Security[J];河北北方学院学报(自然科学版);2008-02
7 LIU Yi-he(Key Lab of Network Application Project Development //Department of Computer and Information Science,Neijiang Normal University,Neijiang,Sichuan 641112,China);A Formal Description About Identification[J];内江师范学院学报;2008-04
8 CEN Fu-li, BI Hong-jun (School of Electronics and Information Engineering, Beijing jiaotong University, Beijing 100044, China );Research on BLP Model and its Improvements[J];信息安全与通信保密;2007-09
9 LIU Yi-he1,2,SHEN Chang-xiang3(1.Dept.of Computer & Information Science,Neijiang Teachers College,Neijiang Sichuan 641112,China;2.Institute of Information Security,Sichuan University,Chengdu Sichuan 610064,China;3.Computing Technology Research Institute of Navy,Beijing 100841,China);Security Model Based on Role Administration[J];计算机应用研究;2007-05
China Proceedings of conference Full-text Database 1 Hits
1 ZHANG Rubin~1,DENG Yi~2,HUANG Hongwei~2,DU Jun~2 (1.Yunan Science and Technology Communication Center,Kunming 650028,China;2.The Provincial Science and Technology Information Center,Kunming 650051,China);Globalization of the National Information Security System and Strategy—based on the perspective of system[A];[C];2010
Chinese Journal Full-text Database 10 Hits
1 Wang Laifu,Shen Jun,Jin Huamin(Guangdong Research Institute of China Telecom Co.,Ltd.,Guangzhou 510630,China);Research on Cloud Computing Security[J];电信科学;2010-06
2 Hu Wei Zhong Weilian Huaihua Vocational and Technical College, Huaihua Hunan, 418000;On Cloud Computing the issues of network security[J];中国科技信息;2008-23
3 CHEN Lu1,ZHANG Huanguo1,2,ZHANG Liqiang1,LI Song1,CAI Liang3 1. School of Computer,Wuhan University/Key Laboratory of Aerospace Information Security and Trusted Computing of Ministry of Education,Wuhan 430072,Hubei,China; 2. State Key Laboratory of Software Engineering,Wuhan University,Wuhan 430072,Hubei,China; 3. Department of Information Security,Information Engineering University,Zhengzhou 450004,Henan,China;A Peer-to-Peer Resource Sharing Scheme Using Trusted Computing Technology[J];Wuhan University Journal of Natural Sciences;2008-05
4 ZHANG Yan-hui SUN Ji-long 1.Department of Computer Science,College of Science,Hebei North University,Zhangjiakou 075000,Hebei,China; 2.Road Toll Colleeting Bureau of Zhangjiakou City,Zhangjiakou 075000,Hebei,China;Anti-virus Principles and Restoration Method for Computer after Virus Attack[J];河北北方学院学报(自然科学版);2007-03
5 Chen Jun,Duan Huiliang Network Center,Central South University,Hunan,410083;Research of Deploying Automatic Updates in Campus Network[J];网络安全技术与应用;2007-01
6 ZHANG Hong 1),2) HE Ye-Ping 1),2) SHI Zhi-Guo 1),2) 1) (National Engineering Research Center for Foundational Software, Institute of Software, Chinese Academy of Sciences, Beijing 100080) 2) (Graduate University of the Chinese Academy of Sciences, Beijing 100039);A Delegation Model for Periodicity Constraints-Based DAC[J];计算机学报;2006-08
7 HONG Fan CUI Yong-Quan CUI Guo-Hua FU Cai (College of Computer Science,Huazhong University of Science and Technology,Wuhan 430074);Administrative Usage Control Model for Secure Interoperability between Administrative Domains[J];计算机科学;2006-03
8 XU Zhen+, LI Lan, FENG Deng-Guo (State Key Laboratory of Information Security, Institute of Software, The Chinese Academy of Sciences, Beijing 100080, China);A Constrained Role-Based Delegation Model[J];软件学报;2005-05
9 XU Chang-feng, LIU Ai-jiang, HE Da-ke (Research Institute of Computer Security & Communication Secrecy, Southwest Jiaotong University, Chengdu Sichuan 610031, China);Implementation of PMI Based on Attribute Certificate in Electronic Government Secure Construction[J];计算机应用研究;2004-01
10 HUANG Jian+, QING Si-Han, WEN Hong-Zi [Institute of Software, The Chinese Academy of Sciences, Beijing 100080\ , China)-58.5( )](Engineering and Research Center for Information Security Technology, The Chinese Academy of Sciences, Beijing 100080, China) + Corresponding author: E-mail: stanleyhuangjian@hotmail.com http://www.ercist.ac.cn;Timed Role-Based Access Control[J];软件学报;2003-11
©2006 Tsinghua Tongfang Knowledge Network Technology Co., Ltd.(Beijing)(TTKN) All rights reserved