共查询到20条相似文献,搜索用时 0 毫秒
1.
HUANG Qiang SHEN Changxiang FANG Yanxiang 《武汉大学学报:自然科学英文版》2007,12(1):13-16
With analysis of limitations Trusted Computing Group (TCG) has encountered, we argued that virtual machine monitor (VMM) is the appropriate architecture for implementing TCG specification. Putting together the VMM architecture, TCG hardware and application-oriented "thin" virtual machine (VM), Trusted VMM-based security architecture is present in this paper with the character of reduced and distributed trusted computing base (TCB). It provides isolation and integrity guarantees based on which general security requirements can be satisfied. 相似文献
2.
YAN Fei ZHANG Huanguo SUN Qi SHEN Zhidong ZHANG Liqiang QIANG Weizhong 《武汉大学学报:自然科学英文版》2006,11(6):1805-1808
Current delegation mechanism of grid security infrastructure (GSI) can't satisfy the requirement of dynamic, distributed and practical security in grid virtual organization. To improve this situation, a TC-enabled GSI is discussed in this paper. With TC-enabled GSI, a practical delegation solution is proposed in this paper through enforcing fine granularity policy over distributed platforms with the emerging trusted computing technologies. Here trusted platform module is treated as a tamper-resistance module to improve grid security infrastructure. With the implement of Project Daonity, it is demonstrated that the solution could gain dynamic and distributed security in grid environment. 相似文献
3.
FANG Yanxiang SHEN Changxiang XU Jingdong WU Gongyi 《武汉大学学报:自然科学英文版》2006,11(6):1424-1428
This paper fist gives an investigation on trusted computing on mainstream operation system (OS). Based on the observations, it is pointed out that Trusted Computing cannot be achieved due to the lack of separation mechanism of the components in mainstream OS. In order to provide a kind of separation mechanism, this paper proposes a separated domain-based kernel model (SDBKM), and this model is verified by non-interference theory. By monitoring and simplifying the trust dependence between domains, this model can solve problems in trust measurement such as deny of service (DoS) attack, Host security, and reduce the overhead of measurement. 相似文献
4.
在多种信息系统中,将虚拟化技术与可信计算相结合的方式是一种保障系统安全的有效手段.然而,传统基于可信平台模块(TPM)的可信系统存在着系统信任基础不明确与数据迁移计算开销大的不足.本文应用便携式可信模块(PTM)信任模型,基于Xen虚拟化平台提出了一种客户端可信虚拟化平台方案——OASIS,设计并实现了OASIS平台结构、可信启动信任链建立方法及数据迁移机制.本方案具有灵活高效、以用户为中心的特点,使用PTM作为系统信任基础,为用户提供个人化可信计算环境,为用户在多平台间漫游的应用场景提供极大的便利性.原型系统测试结果表明,本方案具有可行性. 相似文献
5.
ZHOU Zheng ZHANG Jun LI Jian LIU Yi 《武汉大学学报:自然科学英文版》2006,11(6):1437-1440
0 IntroductionEventhoughsignificant achievement has been madeinre-search of characteristic and abnormal actions of comput-er virus and attack, the investigation of defending the un-known computer virus and attackis progressing much slower .Under the conditions that attackers are much clever , newcomputer virus is presented continuously,the difference be-tween computer virus and normal programis less and lessclear ,detecting computer virus and attack will be more andmore difficult .Andto be the… 相似文献
6.
HAO Liming SUN Xun YANG Shutang LU Songnian 《武汉大学学报:自然科学英文版》2007,12(1):101-104
Trusted computing (TC) technology is brought out by trusted computing group (TCG) to make computing as safe and reliable as people expect. Attestation is one main function specified by TCG, which is the means by which a trusted computer assures a remote computer whose platform is not tampered with. There are two protocols that implement attestation without disclosing the platform's real identity, which are Privacy CA-based protocol and direct anonymous attestation (DAA) protocol. However, in the first protocol the privacy CA is the bottleneck and the platform's identity will be disclosed if the privacy CA is compromise, while DAA protocol can do profiling when dealing with rogue hardware device. In this paper, we propose a DAA-extended new approach to ensure full anonymous attestation that can not only detect a rogue TPM, but also reveal rogue TPM's real identity. 相似文献
7.
提出了一种基于网格环境的可信计算平台共享模型以提高可信与非可信节点混合环境下的整体安全性.模型允许非可信网格节点借用可信节点的可信平台模块及其核心服务以提高自身参与网络协同的可信程度,有助于提高当前网格环境中可信应用的范围.在模型中同时设计了远程协商协议、密钥迁移协议、验证和证明协议来解决共享过程中的交互问题.分析表明使用本模型可以平衡网格的安全性与代价,降低可信计算应用的门槛. 相似文献
8.
一种面向安全SOC的可信体系结构 总被引:2,自引:0,他引:2
提出了面向安全SOC的可信体系结构,以解决其面临的诸多安全问题,可信体系结构的核心是安全域划分和安全审核硬件单元.安全域包括可信基、安全OS、可信应用以及非可信应用,各不同安全域具有静态和动态隔离性;安全SOC中的安全规则最终由安全审核单元在硬件层面来保障.在可信体系结构基础上,讨论了怎样进行安全扩展以获得更全面的安全性,即抗旁路攻击、物理攻击、防止芯片被复制伪造以及因被盗而造成安全危害. 相似文献
9.
CHEN Shuyi WEN Yingyou ZHAO Hong 《武汉大学学报:自然科学英文版》2006,11(6):1507-1510
0 IntroductionThe purpose of trusted computingis to solve some of to-day’s security problems through hardware changes topersonal computer . The trusted property can be extendedfromroot of trust to entire PC platformthrough the chain oftrust[1].Root of trustis a small hardware device calledtrustedplatform module (TPM) addedto PC.A well-known project of trusted computing is trustedcomputing platformalliance(TCPA) .It is calledtrusted com-puting group (TCG) now[2 ,3]. Besides this , other… 相似文献
10.
SHEN Zhidong ZHANG Huanguo ZHANG Miao YAN Fei ZHANG Liqiang 《武汉大学学报:自然科学英文版》2006,11(6):1641-1644
0 IntroductionPeople need a secure and dependable computing environ-ment[1]. The cryptology is known as the core of com-puter security[2]. The application of cryptologyis mainly ful-filled by key management and credential mechanism.In thispaper , we should study the key management and credentialmechanismbased ontrusted computing platform,and give theactual application of these security mechanisms for buildingtrusted computing environment .1 OverviewTrusted Computing1 .1 The Original of Trus… 相似文献
11.
Development of Trusted Computing Research 总被引:1,自引:1,他引:1
ZHANG Huanguo LUO Jie JIN Gang ZHU Zhiqiang YU Fajiang YAN Fei 《武汉大学学报:自然科学英文版》2006,11(6):1407-1413
0 IntroductionWiththe development of informationtechnology,infor-mation market gives all-ti me thriving appearance;theother side,the attack events increased, which have affectednational security and social stabilization. Under the situation,trusted computing (TC) is required.Current trusted computing is to adding the concept oftrust to information society. Through the current technolo-gies ,the trust society would be established and informationsecurity would bei mproved.In technical fields ,… 相似文献
12.
In this paper, we propose a trusted mobile payment environment (TMPE) based on trusted computing and virtualization technology. There are a normal operating system (OS) and a trusted OS (TOS) in TMPE. We store the image of TOS in a memory card to hinder tampering. The integrity of TOS is protected by means of a trusted platform module (TPM). TOS can only be updated through a trusted third party. In addition, virtualization technology is applied to isolate TOS from normal OS. Users complete ordinary affairs in normal OS and security-sensitive affairs in TOS. TMPE can offer users a highly protected environment for mobile payment. Moreover, TMPE has good compatibility in different hardware architectures of mobile platforms. As the evaluation shows, TMPE satisfies the requirement of mobile payment well. 相似文献
13.
基于可信计算思想提出了一个车联网云平台用户间的安全通信模型.该模型借助可信第三方,在申请通信服务过程中为车联网云用户生成临时身份,即对车联网云用户身份进行匿名化处理,以实现对用户身份隐私的保护.在通信过程中,该模型采用双线性对签名的算法分别对用户的身份合法性和平台可信性进行认证,并有效地使用了随机数、密钥和时间戳,以密钥和散列函数确保了签名的不可伪造性,以时间戳确保了密钥的时效性,以随机数机制防止了重放攻击.分析结果表明:在车联网云平台中采用该通信模型可以使通信过程具备可信性、安全性和匿名性. 相似文献
14.
WANG Xiaofei HONG Fan~ TANG Xueming CUI Guohua College of Computer Science Technology Huazhong University of Science Technology Wuhan Hubei China 《武汉大学学报:自然科学英文版》2006,11(6):1467-1472
0 IntroductionDigital signatureis a key technique to provide datainteg-rity andsource authenticationcapabilities to enhance da-ta trustworthiness in trusted computing platform. Most cur-rent digital signature schemes are based on complex mathe-matical problems , such as integer factoring, discrete log-arithm,and discrete logarithm on elliptic curves . The hard-ness of these underlying mathematical problems is really un-certain at present . Merkle treeis a method used for authenti-cation and di… 相似文献
15.
随着目前国际上普适计算研究的发展趋势,国际上对普适计算的研究主要集中在人机接口和上下文感知计算等领域,国内对普适计算的研究主要集中在多模态的智能空间领域。提出了一个普适计算安全体系结构的参考模型,并简要讨论了该参考模型的3个关键研究内容,安全系统层、安全计算层和安全协同层。并列举了一个模型实例。 相似文献
16.
It is absolutely critical that trusted configuration management which significantly affects trust chain establishment, sealing storage and remote attestation, especially in trusted virtualization platform like Xen whose system configuration changes easily. TPM (trusted platform module) context manager is presented to carry out dynamic configuration management for virtual machine. It manages the TPM command requests and VM (virtual machine) configurations. The dynamic configuration representa- tion method based on Merkle hash tree is explicitly proposed against TCG (trusted computing group) static configuration representation. It reflects the true VM status in real time even if the configuration has changed, and it eliminates the invalidation of configuration representation, sealing storage and remote attestation. TPM context manager supports TCG storage protection, remote attestation etc, which greatly enhances the security on trusted virtualization platform. 相似文献
17.
LI Shiqun Shane Balfe ZHOU Jianying CHEN Kefei 《武汉大学学报:自然科学英文版》2006,11(6):1477-1480
Pervasive computing environment is a distributed and mobile space. Trust relationship must be established and ensured between devices and the systems in the pervasive computing environment. The trusted computing (TC) technology introduced by trusted computing group is a distributed-system-wide approach to the provisions of integrity protection of resources. The TC's notion of trust and security can be described as conformed system behaviors of a platform environment such that the conformation can be attested to a remote challenger. In this paper the trust requirements in a pervasive/ubiquitous environment are analyzed. Then security schemes for the pervasive computing are proposed using primitives offered by TC technology. 相似文献
18.
可信计算平台是信息安全技术研究的一个热点。本文详细介绍了可信计算平台的组成及其体系结构,描述了可信计算平台的特点和原理机制,并对目前可信计算平台的研究现状和存在的问题进行了总结。 相似文献
19.
曾凌静 《长春工程学院学报(自然科学版)》2015,(1):120-123
随着计算机与互联网的发展,云计算与物联网、智慧地球等概念一样备受关注。目前云计算已从产生到实质发展阶段,因此云计算的安全问题备受关注,近年来成为计算机学科领域的研究热点。在此背景下,首先介绍了云计算的概念、特点及服务模式,并在此基础上总结了云计算所面临的安全隐患,最后提出了云计算中确保信息安全的解决方案。 相似文献
20.
This paper presents a trusted-environment construction method based on the underlying hardware.This method aims at protecting the security-sensitive software in the aspects of software loading,running,and storing in the general operating system.It extends the trust chain of the traditional trusted computing technology to reach the target software,ensuring trusted loading.The extended memory management mechanism effectively prevents memory dumping and memory tampering for the high-sensitivity data.The file monitoring mechanism protects files from vicious operation made by attackers.Flexible-expanded storage environment provides the target software with static storing protection.Experimental system verifies that the method is suitable for general operating system and can effectively protect security-sensitive software with low overhead. 相似文献