通过自存在机制进行访问控制

Xiaoxia Zheng, Fangyong Hou, Hongjun He, Nong Xiao
{"title":"通过自存在机制进行访问控制","authors":"Xiaoxia Zheng, Fangyong Hou, Hongjun He, Nong Xiao","doi":"10.1109/ICCIT.2010.5711212","DOIUrl":null,"url":null,"abstract":"This paper proposes a security paradigm named self-existent mechanism of access control. The most distinct character is that it runs absolutely independent from program executing environment, even without cooperation of OS. That is to say, it has a unique structure to assure that computing is controlled under a secure mechanism that cannot be penetrated by software like virus, Trojan and other malicious programs. This paper explains its principle, and describes how to accomplish such control over general computers. Also, this paper gives advice to the design of microprocessor to make this control mechanism to work better.","PeriodicalId":131337,"journal":{"name":"5th International Conference on Computer Sciences and Convergence Information Technology","volume":"5 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2010-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Access control through self-existent mechanism\",\"authors\":\"Xiaoxia Zheng, Fangyong Hou, Hongjun He, Nong Xiao\",\"doi\":\"10.1109/ICCIT.2010.5711212\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"This paper proposes a security paradigm named self-existent mechanism of access control. The most distinct character is that it runs absolutely independent from program executing environment, even without cooperation of OS. That is to say, it has a unique structure to assure that computing is controlled under a secure mechanism that cannot be penetrated by software like virus, Trojan and other malicious programs. This paper explains its principle, and describes how to accomplish such control over general computers. Also, this paper gives advice to the design of microprocessor to make this control mechanism to work better.\",\"PeriodicalId\":131337,\"journal\":{\"name\":\"5th International Conference on Computer Sciences and Convergence Information Technology\",\"volume\":\"5 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2010-11-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"5th International Conference on Computer Sciences and Convergence Information Technology\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICCIT.2010.5711212\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"5th International Conference on Computer Sciences and Convergence Information Technology","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCIT.2010.5711212","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

摘要

本文提出了一种名为自存在访问控制机制的安全范式。它最大的特点是完全独立于程序执行环境运行,甚至不需要操作系统的配合。也就是说,它有一个独特的结构,以确保计算在一种安全机制下进行控制,而这种机制无法被病毒、木马和其他恶意程序等软件渗透。本文阐述了其原理,并介绍了如何在一般计算机上实现这种控制。并对微处理器的设计提出了建议,以使该控制机制更好地工作。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Access control through self-existent mechanism
This paper proposes a security paradigm named self-existent mechanism of access control. The most distinct character is that it runs absolutely independent from program executing environment, even without cooperation of OS. That is to say, it has a unique structure to assure that computing is controlled under a secure mechanism that cannot be penetrated by software like virus, Trojan and other malicious programs. This paper explains its principle, and describes how to accomplish such control over general computers. Also, this paper gives advice to the design of microprocessor to make this control mechanism to work better.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信