Zobrazeno 1 - 10
of 30
pro vyhledávání: '"Shen Chang-xiang"'
Publikováno v:
Tongxin xuebao, Vol 30, Pp 127-134 (2009)
Under the framework of TNC,a new method was proposed to calculate the "healthy status" of a terminal based on analyzing the real-time characteristics of its behavior and process activity.Compared with the existing method,which based on static charact
Externí odkaz:
https://doaj.org/article/f0c18513ca7945c5a75b7de7d715fe95
Publikováno v:
Tongxin xuebao, Vol 30, Pp 102-108 (2009)
A lock-free algorithm for Linux packet buffer recycling on multi-core processor was proposed.Through making a model of Linux network packet forwarding, the principle of Linux packet buffer recycling was analyzed, and the main reason that the mechanis
Externí odkaz:
https://doaj.org/article/bb3a0fa3e94940bfa295e24ab3fe01de
Publikováno v:
Tongxin xuebao, Vol 30, Pp 6-11 (2009)
A novel abstract model for the design of trusted computing platform system was proposed.By using the basic idea of non-interference theory as reference and introduces the reasoning method of process algebra, thus abstracting the system as processes,
Externí odkaz:
https://doaj.org/article/cd76353cb0674231bb72aa7614f0f73f
Publikováno v:
In Applied Mathematics and Computation 1 April 2014 232:511-520
Publikováno v:
In Journal of Mathematical Analysis and Applications 1 September 2013 405(1):148-155
Publikováno v:
Wuhan University Journal of Natural Sciences. 11:1424-1428
This paper fist gives an investigation on trusted computing on mainstream operation system (OS). Based on the observations, it is pointed out that Trusted Computing cannot be achieved due to the lack of separation mechanism of the components in mains
Autor:
Shen Chang-xiang, Chen You-lei
Publikováno v:
Wuhan University Journal of Natural Sciences. 10:1-4
A security kernel architecture built on trusted computing platform in the light of thinking about trusted computing is presented. According to this architecture, a new security module TCB (Trusted Computing Base) is added to the operation system kern
Publikováno v:
2009 International Conference on Multimedia Information Networking and Security.
Network covert channels can be used to transfer secret information in network protocols. For a kind of network covert channels hidden in overt sources with fixed probability distribution, we propose a modified Pearson chi-square test which improves d
Publikováno v:
2008 9th International Conference on Signal Processing.
A network covert channel is a mechanism that can be used to leak information across a network in violation of a security policy. In this paper, we first describe an enumerative covert channel existing in MSL networks, and then we propose a model for
Publikováno v:
IET 2nd International Conference on Wireless, Mobile and Multimedia Networks (ICWMMN 2008).
With the development of Internet and its application, mobile code technique has become a hot research area in latest years. Because mobile codes have strong ability of being independent, autonomic, mobile, and mixed with data, it's ineffective to han