期刊文献+

容忍非信任组件的可信终端模型研究 被引量:6

Research on Trusted Terminal Computer Model Tolerating Untrusted Components
下载PDF
导出
摘要 可信计算规范要求可信计算平台上运行的所有组件均要保证可信,这一机制严重制约了可信计算平台的应用.本文提出一种容忍非信任组件的可信终端模型,与现有可信计算平台相比,该模型允许非信任组件的存在,但同时能保证安全结果可预测和可控性.模型分为可信域和容忍非信任组件的不可信域.基于信息流无干扰理论和域间无干扰思想,给出非信任组件容忍机制并推导出可信终端应满足的充分条件.在此基础上给出具体的物理模型设计,并证明该模型为可信终端模型. The Trust Computing Group Specifications specify all components running on the trusted computing platform should be trusted,which seriously restrained the applications of trusted computing platform.This paper proposes a trusted terminal computer model tolerating untrusted components.Comparing with the existing trusted platforms,the model allows untrusted components loading and assures the security results be expected and controlled.The model includes trusted domains and untrusted domains tolerating untrusted components.With the non-interference theory,an untrusted component-tolerating mechanism is designed and reasons out the sufficient conditions about the trusted domain can run trustfully.Based on the theory model,provides a detailed physical model and proves it be a trusted terminal computer model.
出处 《电子学报》 EI CAS CSCD 北大核心 2011年第4期934-939,共6页 Acta Electronica Sinica
基金 国家863高技术研究发展计划(No.2007AA01Z479)
关键词 可信终端模型 非信任组件 无干扰 嵌入式可信系统 trusted terminal model untrusted components non-interference embedded trusted system
  • 相关文献

参考文献14

  • 1Trusted Computing Group. TNC Architecture for Interoperability [ EB/OL ]. http://www, trustedcomputinggroup, org/resources/tnc architecture for_ interoperability_ version_ 13.
  • 2李晓勇,左晓栋,沈昌祥.基于系统行为的计算平台可信证明[J].电子学报,2007,35(7):1234-1239. 被引量:35
  • 3Intel. Intel Trusted Execution Technology [ EB/OL]. http:// www. intel, com/technology/security/downloads/TrustedExec _ Overview. pdf, 2007.
  • 4Microsoft Coporation.. Next-generation secure computing base [ EBOL ]. http://www, microsoft, com/res- ources/ngscb/default, mspx 2003.
  • 5刘毅,余发江.瑞达可信计算平台[J].信息网络安全,2006(11):23-25. 被引量:1
  • 6Trusted Computing Group. TCG specification architecture overview [ EB/OL ]. http://www, tmstedcomputinggroup. org/resources/tcg architecture_ overview version_ 14, 2010 - 03.
  • 7Trusted Computing Group. Infrastructure work group integrity report schema specification[ EB/OL]. http://www, trustedcomputinggroup, org/resources/infrastructure _ work_ groupintegrity _ report_ schema_ specification version_ 10, 2010 - 03.
  • 8周明辉,梅宏.可信计算研究的初步探疑[J].计算机科学,2004,31(7):5-8. 被引量:14
  • 9Goguan J A. Meseguem J. Security policies and security model [A]. The 1982 IEEE Symposium on Security and Privacy[ C]. Qakland, California, 1982.11 - 20.
  • 10RUSHBY J. Noninterference, Transitivity, and Channel-Control Security Policies [ R ]. CSL-92-02, Menlo Park: Stanford Research Institute, 1992.

二级参考文献63

共引文献89

同被引文献83

  • 1张衡,吴礼发,张毓森,曾庆凯.一种r可变阴性选择算法及其仿真分析[J].计算机学报,2005,28(10):1614-1619. 被引量:43
  • 2张焕国,罗捷,金刚,朱智强,余发江,严飞.可信计算研究进展[J].武汉大学学报(理学版),2006,52(5):513-518. 被引量:114
  • 3沈昌祥,张焕国,冯登国,曹珍富,黄继武.信息安全综述[J].中国科学(E辑),2007,37(2):129-150. 被引量:359
  • 4SHEN ChangXiang,ZHANG HuangGuo,FENG DengGuo,CAO ZhenFu,HUANG JiWu.Survey of information security[J].Science in China(Series F),2007,50(3):273-298. 被引量:40
  • 5张焕国,赵波.可信计算[M].武汉:武汉大学出版社,2011:33-35.
  • 6Trusted Computing Group. TPM Main Part l Design Principles Specification Version 1.2[EB/OL][2012-10-29]. http://www. trustedcomputinggroup.org/files/resource_files/646BE624-1D09-3519-ADDA61BE37A21A74/mainP1DPrev103.pdf.
  • 7Trusted Computing Group. TCG Specification Architecture Overview[EB/OL][2012-10-29]. http://www.Trustedcomputing. group.org/files/resource_files/AC652DE1-1D09-3519-ADA026A0C05CFAC2/TCG_1_4_Architecture_Overview.pdf.
  • 8Goguen J A, Meseguer J. Security Policies and Security Models[C]//Proc. of IEEE Symp. on Security and Privacy. Los Alamitos, USA: IEEE Computer Society, 1982.
  • 9Rushby J. Noninterference, Transitivity, and Channel-control Security Policies[R]. Stanford Research Institute, Tech Rep: CSL-92-02, 1992.
  • 10Harrison M A, Ruzzo W L, Ullman J D. Protection in Operating Systems[J]. Communications of the ACM, 1976, 19(8): 461-471.

引证文献6

二级引证文献38

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部