An Application Anti-Attack Model

Abstract:

Article Preview

With the development of computer technology and network application, the safety of application has become one of the most important research problems in the field of information security. Firstly, the paper analyzes malicious attack approaches for applications. Secondly, this article proposes an application anti-attack model (AAM), and further presents the formal description of the model. Finally, this paper represents its good security properties and proves them.

Info:

Periodical:

Advanced Materials Research (Volumes 255-260)

Edited by:

Jingying Zhao

Pages:

2197-2202

DOI:

10.4028/www.scientific.net/AMR.255-260.2197

Citation:

H. J. He et al., "An Application Anti-Attack Model", Advanced Materials Research, Vols. 255-260, pp. 2197-2202, 2011

Online since:

May 2011

Export:

Price:

$38.00

[1] HE Xiu-xiong, HE Hong-jun, etc., Principle and Countermeasure of Virus Attack, Chian information security, 2009, 8(8), pp.136-138.

[2] David Challener, Kent Yoder, Ryan Catherman, etc., A Practical Guide to Trusted Computing, Published by Pearson Education, Inc., (2008).

[3] HE Hong-Jun, CAO Si-Hua, etc., Explicit Authorization Mechanism and Corresponding Trusted Secure Computer System, Chinese journal of computers, 2006, 29(8), pp.1318-1328.

[4] Fred Cohen, Computational Aspects of Computer Viruses, Computers and Security, 1989, 8(4), pp.325-344.

[5] Prabhat K. Lakhotia A, Analysis and Detection of Computer Viruses and Worms: An annotated bibliography, ACM SIGNPLAN Notices, 2002, 37(2), pp.29-35.

DOI: 10.1145/568600.568608

[6] Necula, G.C., Proof-carrying code. Proc. 24th ACM Symp. Principles of Programming Languages, 1997, pp.106-119.

In order to see related information, you need to Login.