期刊文献+

Implementing Operating System Support for Extended Trusted Path in TPM-Capable Environments 被引量:3

Implementing Operating System Support for Extended Trusted Path in TPM-Capable Environments
下载PDF
导出
摘要 Trusted path is one of the crucial features that operating systems must provide for fundamental security support. In order to explore the possibility of implementing a trusted path mechanism with the support of trusted platform module (TPM) technologies, and to support TPM capabilities in operating systems, the paper extended the scope of the conventional trusted path to cover the situation in which a user communicates with software residing on a remote host. The paper combined the concept of operating system support for trusted path with that for TPM platforms, and proposed the architecture of an extended trusted path mechanism in operating system with considerations on TPM-capable platforms support. As part of the author's research in secure operating systems, the work of the paper was carried out with Linux as an experimental prototype system. The research result shows that TPM capabilities can strengthen extended trusted path mechanisms of operating systems. Trusted path is one of the crucial features that operating systems must provide for fundamental security support. In order to explore the possibility of implementing a trusted path mechanism with the support of trusted platform module (TPM) technologies, and to support TPM capabilities in operating systems, the paper extended the scope of the conventional trusted path to cover the situation in which a user communicates with software residing on a remote host. The paper combined the concept of operating system support for trusted path with that for TPM platforms, and proposed the architecture of an extended trusted path mechanism in operating system with considerations on TPM-capable platforms support. As part of the author's research in secure operating systems, the work of the paper was carried out with Linux as an experimental prototype system. The research result shows that TPM capabilities can strengthen extended trusted path mechanisms of operating systems.
作者 SHI Wenchang
机构地区 Institute of Software
出处 《Wuhan University Journal of Natural Sciences》 CAS 2006年第6期1493-1497,共5页 武汉大学学报(自然科学英文版)
基金 Supported by the National Natural Science Foun-dation of China (60373054)
关键词 operating system trusted path trusted platform module (TPM) trusted software operating system trusted path trusted platform module (TPM) trusted software
  • 相关文献

参考文献10

  • 1DoD5200. 28-STD Trusted Computer System Evaluation Criteria . 1985
  • 2ISO/IEC15408-2: 1999 (E) Evaluation Criteria for IT Security Part 2: Security Functional Requirements . 1999
  • 3Kelong,Liu,Feng,Dengguo,Wenchang,Shi. Secure Operating Systems: Principles and Technologies . 2004
  • 4Final Evaluation Report TIS Trusted XENIX version 4. 0 . 1994
  • 5Garfinkel,T,Rosenblum,M,Boneh,D. Flexible OS Support and Applications for Trusted Computing [C]//Proceedings of the 9th Workshop on Hot Topics in Operating Systems . 2003
  • 6Trusted Computing Group.Trusted Platform Modules Strengthen User and Platform Authenticity [ DB/OL][].https:// wwwtrustedcomputinggrouporg/ specs / TPM/ Whitepaper-TPMs-Strengthen-User-and- Platform-Authenticity-Final--pdf.2006
  • 7Rau S.The Trusted Computing Platform Emerges as Indus- try’’s First Comprehensive Approach to IT Security [ DB/ OL][].https:// www trustedcomputing- grouporg/news/Industry-Data/IDC--Web pdf.2006
  • 8Kay R L.Howto Implement Trusted Computing: A Guide to Tighter Enterprise Security[].ht- tps: // wwwtrustedcomputinggrouporg/news/Industry- Data/Implementing-Trusted-Computing-RKpdf.2006
  • 9Trusted Computing Group.TCG Software Stack ( TSS) Specification Version 1 .2 Level 1 Part1 : Commands and Structures[].https:// wwwtrusted computinggrouporg/specs/ TSS/ TSS-Version--Level- -FINALpdf.2006
  • 10Trusted Computing Group.Trusted Network Connect : Open Standards for Integrity-Based Access Control [ DB/OL][].https:// wwwtrustedcomputinggrouporg/ groups/network/ Open-Standards-for-IntegrityBased-Ac- cessControlpdf.2006

同被引文献13

引证文献3

二级引证文献16

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部