[1] |
Arai M, Tanaka H. A proposal for an effective information flow control model for sharing and protecting sensitive information[C]// Proceedings of the 7th Australasian Conference on Information Security. 2009:89-98.
|
[2] |
Li Shaobo, Lv Shulin, Jia Xiaohui, et al. Application of clipboard monitoring technology in graphic and document information security protection system[C]// Proceedings of the 3rd IEEE International Symposium on Intelligent Information Technology and Security Informatics (IITSI). 2010:423-426.
|
[3] |
Park C, Kim H. System and Method for Clipboard Security: USA, 20120226913[P]. 2012-09-06.
|
[4] |
Lee H. Clipboard Protection System in DRM Environment and Recording Medium in Which Program for Executing Method in Computer Is Recorded: USA, 20130151864A1[P]. 2013-06-13.
|
[5] |
唐雨. 数字文档权限管理系统的研究与实现[D]. 北京:北京邮电大学, 2013.
|
[6] |
Lam Ka Chun, Lau Wing Cheong, Yue On Ching. Hitchbot: Delivering malicious URLs via social hitchhiking[C]// Proceedings of the 2011 IEEE Global Telecommunications Conference (GLOBECOM 2011). 2011.
|
[7] |
马俊,王志英,任江春,等. TRSF: 一种移动存储设备主动防护框架[J]. 电子学报, 2012,40(2):376-383.
|
[8] |
Okolica J, Peterson G L. Extracting the windows clipboard from physical memory[J]. Digital Investigation, 2011,8:S118-S124.
|
[9] |
北京鼎信高科信息技术有限公司. 一种通过Windows系统服务监控Windows系统剪贴板的方法: 中国, 200710118584.2[P]. 2009-02-04.
|
[10] |
王文宇,刘玉红. 一种应用安全增强中间件的设计与实现[J]. 计算机安全, 2012(12):20-24.
|
[11] |
Zuili P. Method and System for Restricting Use of a Clipboard Application: USA, 7950066[P]. 2011-05-24.
|
[12] |
Liu Chihchieh, Chen Weiyuan. System and Method for the Prevention of Malicious File Copying: USA, 8245314[P]. 2012-08-14.
|
[13] |
李海锋. 基于DRM的数据安全管理系统访问控制授权策略研究[D]. 长沙:国防科学技术大学, 2011.
|
[14] |
Ishizawa C, Sato R, Nishida M. Method for detecting remaining files that contain copied data by monitoring clipboard and directory[J]. International Journal of the Society of Materials Engineering for Resources, 2013,19(1-2):11-19.
|
[15] |
焦永生. 进程间通信过程逆向分析技术研究[D]. 郑州:解放军信息工程大学, 2013.
|
[16] |
任建华,江国华. 终端文件安全保障系统中剪贴板监控技术的应用[J]. 计算机应用, 2005,25(S1):86-88.
|
[17] |
王群策,杨百龙,陈启胜. 基于API HOOK的剪切板监控[J]. 计算机与信息技术, 2010(10):54-55.
|