首页 | 本学科首页   官方微博 | 高级检索  
     检索      

基于用户授权的数据保护方法
引用本文:董黎明,何鸿君,罗莉,何修雄.基于用户授权的数据保护方法[J].信息安全与通信保密,2009(8):114-117.
作者姓名:董黎明  何鸿君  罗莉  何修雄
作者单位:国防科技大学,计算机学院,湖南,长沙,410073
摘    要:计算机病毒、间谍软件等的危害之一是对重要信息的窃取或者修改,现有的安全软件或者防火墙等防护措施不能对数据提供实时的、全面的防护,一些恶意程序总是能够通过采用新技术来伪装、欺骗而逃过检测。针对这一问题,文中提出一种基于用户授权的数据保护方法。与传统的保护方法不同,该方法对恶意程序的检测没有停留在对程序本身代码和行为的合法性上,而是以用户为标准,要求所有对受保护数据的访问都必须经过用户的授权,对没有受权的访问请求即认为是不合法的;进一步,文中提出了自动获取用户授权的方案,提高了该方法的可用性。

关 键 词:数据安全  用户授权  文件  恶意软件

Data Protect Method Based on User's Authorization
DONG Li-ming,HE Hong-jun,LUO Li,HE Xiu-xiong.Data Protect Method Based on User's Authorization[J].China Information Security,2009(8):114-117.
Authors:DONG Li-ming  HE Hong-jun  LUO Li  HE Xiu-xiong
Institution:(School of Computer Science, National University of Defense Technology, Changsha Hunan 410073, China)
Abstract:The main harm that computer virus and important data. Nowadays, protect methods such as sa spyware fety so real time and full-scale protect, and some malicious softwa do to the people is stealing or modifies people' s ftware and firewall etc. are not able to provide re always could escape or bypass the checking by disguising themselves or cheating safety software. To this problem, this paper puts forwardadataprotect method based on user' s authorization. Unlike the traditional protect methods, this method does not only roly on software' s codes and behaviors in identifying their validity; instead, this method takes user' s authorization as standard, and requires that all the file access requests should be authorized by the user and those requests without user' s authorization are reguarded as invalid. Furthermore this paper gives a proposal on how to automatically get user' s authorization, thus greatly emhancing the usability of this method.
Keywords:data security  user' s authorization  file: malicious software
本文献已被 维普 万方数据 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号