[1] Arai M, Tanaka H. A proposal for an effective information flow control model for sharing and protecting sensitive information[C]// Proceedings of the 7th Australasian Conference on Information Security. 2009:89-98.
[2] Li Shaobo, Lv Shulin, Jia Xiaohui, et al. Application of clipboard monitoring technology in graphic and document information security protection system[C]// Proceedings of the 3rd IEEE International Symposium on Intelligent Information Technology and Security Informatics (IITSI). 2010:423-426.
[3] Park C, Kim H. System and Method for Clipboard Security: USA, 20120226913[P]. 2012-09-06.
[4] Lee H. Clipboard Protection System in DRM Environment and Recording Medium in Which Program for Executing Method in Computer Is Recorded: USA, 20130151864A1[P]. 2013-06-13.
[5] 唐雨. 数字文档权限管理系统的研究与实现[D]. 北京:北京邮电大学, 2013.
[6] Lam Ka Chun, Lau Wing Cheong, Yue On Ching. Hitchbot: Delivering malicious URLs via social hitchhiking[C]// Proceedings of the 2011 IEEE Global Telecommunications Conference (GLOBECOM 2011). 2011.
[7] 马俊,王志英,任江春,等. TRSF: 一种移动存储设备主动防护框架[J]. 电子学报, 2012,40(2):376-383.
[8] Okolica J, Peterson G L. Extracting the windows clipboard from physical memory[J]. Digital Investigation, 2011,8:S118-S124.
[9] 北京鼎信高科信息技术有限公司. 一种通过Windows系统服务监控Windows系统剪贴板的方法: 中国, 200710118584.2[P]. 2009-02-04.
[10]王文宇,刘玉红. 一种应用安全增强中间件的设计与实现[J]. 计算机安全, 2012(12):20-24.
[11]Zuili P. Method and System for Restricting Use of a Clipboard Application: USA, 7950066[P]. 2011-05-24.
[12]Liu Chihchieh, Chen Weiyuan. System and Method for the Prevention of Malicious File Copying: USA, 8245314[P]. 2012-08-14.
[13]李海锋. 基于DRM的数据安全管理系统访问控制授权策略研究[D]. 长沙:国防科学技术大学, 2011.
[14]Ishizawa C, Sato R, Nishida M. Method for detecting remaining files that contain copied data by monitoring clipboard and directory[J]. International Journal of the Society of Materials Engineering for Resources, 2013,19(1-2):11-19.
[15]焦永生. 进程间通信过程逆向分析技术研究[D]. 郑州:解放军信息工程大学, 2013.
[16]任建华,江国华. 终端文件安全保障系统中剪贴板监控技术的应用[J]. 计算机应用, 2005,25(S1):86-88.
[17]王群策,杨百龙,陈启胜. 基于API HOOK的剪切板监控[J]. 计算机与信息技术, 2010(10):54-55.
|