首页> 外文会议>Annual Computer Security Applications Conference >Integrating cryptography in the trusted computing base
【24h】

Integrating cryptography in the trusted computing base

机译:在可信计算基础中集成密码

获取原文

摘要

Secure distributed systems are not easily constructed, as they combine mechanisms based on very different theories of security (encryption and reference monitors). The authors show how these mechanisms may be integrated via the Unix STREAMS mechanism Examples are given of how this architecture can support existing security protocols and it is shown why it is consistent with the Bell-LaPadula and Biba information-flow models.
机译:当它们基于非常不同的安全性(加密和参考监视器)时,安全分布式系统不容易构建。作者展示了如何通过UNIX流机制集成的这些机制如何实现该体系结构如何支持现有的安全协议,并显示为什么它与Bell-Lapadula和Biba信息流模型一致。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号