期刊文献+

基于可信计算平台的可信引导过程研究 被引量:8

Research of trusted startup process based on trusted platform module
下载PDF
导出
摘要 基于可信计算联盟的规范,设计了基于TPM的可信引导过程,并指出了该可信引导过程中亟待解决的问题。安全性分析表明,该可信引导过程可以使计算机获得更高的安全保障,为进一步建立可信计算环境提供了基础。 According to the standards of the trusted computing group, based on the analysis to the boot process of the common operator system, this paper designed a trusted boot process which has ability to collect and attest the integrity status of the system, and discussed the problems in the process which have to be resolved urgently. It is shows by the security analysis that the high assurance of system security.has been gained, thus the basis for building the trusted computing environment has been provided.
作者 谭良 周明天
出处 《计算机应用研究》 CSCD 北大核心 2008年第1期232-234,共3页 Application Research of Computers
基金 国家“863”计划资助项目(863-104-03-01) 2003年度四川省科技攻关项目(03GG007-007)
关键词 可信计算 可信平台模块 完整性度量 trusted computing trusted platform module (TPM) attestation of integrity
  • 相关文献

参考文献15

二级参考文献104

  • 1黄涛,沈昌祥.一种基于可信服务器的可信引导方案[J].武汉大学学报(理学版),2004,50(A01):12-14. 被引量:19
  • 2林闯,任丰原.可控可信可扩展的新一代互联网[J].软件学报,2004,15(12):1815-1821. 被引量:79
  • 3.中国互联网发展状况统计[EB/OL].http://www.cnnic.net.cn,.
  • 4S Micali.Efficient Certificate Revocation[M].Cambridge,MA,USA:Massachusetts Institute of Technology,1996.542-563.
  • 5Paul C Kochar.On certificate revocation and validation[A].Proceedings of the Second International Conference on Financial Cryptography[C].Berlin:Springer-Verlag,1998.171-177.
  • 6Moni,Naor,Kobbi,Nissim.Certificate revocation and certificate update[J].IEEE Journal on Selected Areasin Communications,2000,18(1):561-170.
  • 7Hously R,Ford W,Polk W,et al.Internet X.509 publickey infrastructure certificate and CRL profile[S].IETF RFC2459,1999,http://www.ietf.org/rfc/rfc2459.html.
  • 8André (A)rnes,Mike Just,Svein J,et al.Selecting revocation solutions for PKI[A].Proceedings of The Fifth Nordic Workshop on Secure IT Systems (NORDSEC 2000)[C].Reykjavik,Iceland,2000.360-376.
  • 9Cooper A Cooper.A more efficient use of Delta-CRLs[A].The Proceedings of the 2000 IEEE Symposium on Security and Privacy[C].Berkeley,2000.190-202.
  • 10David A Cooper.A model of certificate revoction[A].The Proceedings of Fifteenth Annual Comperter Security Application Conference[C].Phoenix,1999.256-264.

共引文献351

同被引文献48

引证文献8

二级引证文献22

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部