信息网络安全 ›› 2015, Vol. 15 ›› Issue (2): 1-6.doi: 10.3969/j.issn.1671-1122.2015.02.001

• •    下一篇

关键基础设施安全防护

卿斯汉1,2,3   

  1. 1. 中国科学院软件研究所,北京 100190
    2. 信息安全国家重点实验室, 北京 100093
    3. 北京大学软件与微电子学院,北京 102600
  • 收稿日期:2015-02-01 出版日期:2015-02-10 发布日期:2015-07-05
  • 作者简介:

    作者简介: 卿斯汉(1939-),男,湖南,研究员,主要研究方向:安全协议、可信计算、云安全、操作系统安全等。

  • 基金资助:
    国家自然科学基金[61170282]

Security Protection of Critical Infrastructure

Si-han QING1,2,3   

  1. 1. Institute of Software, Chinese Academy of Sciences, Beijing 100190, China
    2. State Key Laboratory of Information Security, Beijing 100093, China
    3. School of Software & Microelectronics, Peking University, Beijing 102600, China
  • Received:2015-02-01 Online:2015-02-10 Published:2015-07-05

摘要:

随着互联网应用的飞速发展,网络安全威胁持续增长。关键基础设施的建设与安全防护关乎国家安全,必须高度重视。文章阐述了美国和欧洲的措施,分析了中国应当如何应对,并从技术层面论述了基础软件与硬件、云计算基础设施、可信计算技术、身份鉴别机制等面临的技术挑战,分析了技术走势与最新进展。

关键词: 关键基础设施, 云安全, 操作系统安全, 可信计算, 身份鉴别

Abstract:

The network security threats continuously increase with the rapid development of Internet applications. The construction and security protection of critical infrastructure must be highly valued as it is related to national security. This paper addresses the measures US and Europe have taken, analyzes what China should do, and describes the challenges faced by basic software and hardware, cloud computing infrastructure, trusted computing technology, and identity authentication mechanism, etc. from a technical perspective, and analyzes the trend of technology and latest advances.

Key words: critical infrastructure, cloud security, OS security, trusted computing, identity authentication

中图分类号: