• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Yang Tao, Wang Yonggang, Tang Liyong, Kong Lingbo, Hu Jianbin, Chen Zhong. A Practical Dynamic Integrity Protection Model[J]. Journal of Computer Research and Development, 2013, 50(10): 2082-2091.
Citation: Yang Tao, Wang Yonggang, Tang Liyong, Kong Lingbo, Hu Jianbin, Chen Zhong. A Practical Dynamic Integrity Protection Model[J]. Journal of Computer Research and Development, 2013, 50(10): 2082-2091.

A Practical Dynamic Integrity Protection Model

More Information
  • Published Date: October 14, 2013
  • Since the integrity policy model has been proposed, its maturity has always been lower than that of the confidentiality policy model. The restriction is due to integrity level dividing and usability. In this paper, different kinds of integrity models are summarized from the point of practicability with their characteristics concluded. Based on the previous discussion, this paper presents a practical dynamic integrity protection model called DMIP. It simplifies the intricacy of integrity level dividing and solves the existing problems on practicability of current integrity models especially for Linux. The DMIP is designed to preserve the integrity of system from potential network-based attacks and local malicious files. From the usability of Linux, DMIP improves the current integrity protection models. The paper also shows the invariant and constraint of DMIP model and provides formalization proof in theory.
  • Related Articles

    [1]Lang Xuancong, Li Chunsheng, Liu Yong, Wang Mei. Regret Bounds for Online Pairwise Learning with Non-Convex Loss Functions Using Stability Analysis[J]. Journal of Computer Research and Development, 2023, 60(12): 2806-2813. DOI: 10.7544/issn1000-1239.202220221
    [2]Ma Haiyan, Liang Yongquan, Ji Shujuan, Li Da. A Trust-Distrust Based Reputation Attacks Defending Strategy and Its Stability Analysis[J]. Journal of Computer Research and Development, 2018, 55(12): 2685-2702. DOI: 10.7544/issn1000-1239.2018.20170587
    [3]Wei Shanshan, Xie Wei, He Zhiqiang. Digital Video Stabilization Techniques: A Survey[J]. Journal of Computer Research and Development, 2017, 54(9): 2044-2058. DOI: 10.7544/issn1000-1239.2017.20160078
    [4]Lin Fei, Sun Yong, Ding Hong, Ren Yizhi. Self Stabilizing Distributed Transactional Memory Model and Algorithms[J]. Journal of Computer Research and Development, 2014, 51(9): 2046-2057. DOI: 10.7544/issn1000-1239.2014.20130058
    [5]Huo Lin, Li Deshun, and Tan Yinglu. Algorithms of Spanning Tree Based on the Stability Probability and Contribution Link of Nodes for Application Layer Multicast[J]. Journal of Computer Research and Development, 2012, 49(12): 2559-2567.
    [6]Wang Bo, Huang Jiuming, Jia Yan, and Yang Shuqiang. Research on a Common Feature Selection Method for Multiple Supervised Models[J]. Journal of Computer Research and Development, 2010, 47(9): 1548-1557.
    [7]Zhang Zhong and Li Chuandong. Asymptotical Stability Analysis for Recurrent Neural Networks with Time-Varying Delays[J]. Journal of Computer Research and Development, 2007, 44(6): 973-979.
    [8]Wu Zhendong and Li Shanping. A Topology Control Algorithm Based on Link Reliability and Multi-Path for Sensor Networks[J]. Journal of Computer Research and Development, 2007, 44(2): 216-222.
    [9]Wang Sichun, Zhang Taishan, Yin Zhiyun, Zhang Chuwen. Stability Analysis of Multiobjective Decision Functions Based on GP 【removal】[J]. Journal of Computer Research and Development, 2005, 42(8): 1318-1323.
    [10]Yang Hongyong, Kong Xiangxin, Zhang Fuzeng. Stability of an AQM Control Algorithm with Communication Delays[J]. Journal of Computer Research and Development, 2005, 42(7): 1123-1127.

Catalog

    Article views (754) PDF downloads (563) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return