共查询到20条相似文献,搜索用时 0 毫秒
1.
在多种信息系统中,将虚拟化技术与可信计算相结合的方式是一种保障系统安全的有效手段.然而,传统基于可信平台模块(TPM)的可信系统存在着系统信任基础不明确与数据迁移计算开销大的不足.本文应用便携式可信模块(PTM)信任模型,基于Xen虚拟化平台提出了一种客户端可信虚拟化平台方案——OASIS,设计并实现了OASIS平台结构、可信启动信任链建立方法及数据迁移机制.本方案具有灵活高效、以用户为中心的特点,使用PTM作为系统信任基础,为用户提供个人化可信计算环境,为用户在多平台间漫游的应用场景提供极大的便利性.原型系统测试结果表明,本方案具有可行性. 相似文献
2.
一种面向安全SOC的可信体系结构 总被引:2,自引:0,他引:2
提出了面向安全SOC的可信体系结构,以解决其面临的诸多安全问题,可信体系结构的核心是安全域划分和安全审核硬件单元.安全域包括可信基、安全OS、可信应用以及非可信应用,各不同安全域具有静态和动态隔离性;安全SOC中的安全规则最终由安全审核单元在硬件层面来保障.在可信体系结构基础上,讨论了怎样进行安全扩展以获得更全面的安全性,即抗旁路攻击、物理攻击、防止芯片被复制伪造以及因被盗而造成安全危害. 相似文献
3.
Development of Trusted Computing Research 总被引:1,自引:1,他引:1
ZHANG Huanguo LUO Jie JIN Gang ZHU Zhiqiang YU Fajiang YAN Fei 《武汉大学学报:自然科学英文版》2006,11(6):1407-1413
0 IntroductionWiththe development of informationtechnology,infor-mation market gives all-ti me thriving appearance;theother side,the attack events increased, which have affectednational security and social stabilization. Under the situation,trusted computing (TC) is required.Current trusted computing is to adding the concept oftrust to information society. Through the current technolo-gies ,the trust society would be established and informationsecurity would bei mproved.In technical fields ,… 相似文献
4.
提出了一种基于网格环境的可信计算平台共享模型以提高可信与非可信节点混合环境下的整体安全性.模型允许非可信网格节点借用可信节点的可信平台模块及其核心服务以提高自身参与网络协同的可信程度,有助于提高当前网格环境中可信应用的范围.在模型中同时设计了远程协商协议、密钥迁移协议、验证和证明协议来解决共享过程中的交互问题.分析表明使用本模型可以平衡网格的安全性与代价,降低可信计算应用的门槛. 相似文献
5.
A Security Kernel Architecture Based Trusted Computing Platform 总被引:4,自引:0,他引:4
CHENYou-lei SHENChang-xiang 《武汉大学学报:自然科学英文版》2005,10(1):1-4
6.
HAO Liming SUN Xun YANG Shutang LU Songnian 《武汉大学学报:自然科学英文版》2007,12(1):101-104
Trusted computing (TC) technology is brought out by trusted computing group (TCG) to make computing as safe and reliable as people expect. Attestation is one main function specified by TCG, which is the means by which a trusted computer assures a remote computer whose platform is not tampered with. There are two protocols that implement attestation without disclosing the platform's real identity, which are Privacy CA-based protocol and direct anonymous attestation (DAA) protocol. However, in the first protocol the privacy CA is the bottleneck and the platform's identity will be disclosed if the privacy CA is compromise, while DAA protocol can do profiling when dealing with rogue hardware device. In this paper, we propose a DAA-extended new approach to ensure full anonymous attestation that can not only detect a rogue TPM, but also reveal rogue TPM's real identity. 相似文献
7.
In this paper, we propose a trusted mobile payment environment (TMPE) based on trusted computing and virtualization technology. There are a normal operating system (OS) and a trusted OS (TOS) in TMPE. We store the image of TOS in a memory card to hinder tampering. The integrity of TOS is protected by means of a trusted platform module (TPM). TOS can only be updated through a trusted third party. In addition, virtualization technology is applied to isolate TOS from normal OS. Users complete ordinary affairs in normal OS and security-sensitive affairs in TOS. TMPE can offer users a highly protected environment for mobile payment. Moreover, TMPE has good compatibility in different hardware architectures of mobile platforms. As the evaluation shows, TMPE satisfies the requirement of mobile payment well. 相似文献
8.
YAN Fei ZHANG Huanguo SUN Qi SHEN Zhidong ZHANG Liqiang QIANG Weizhong 《武汉大学学报:自然科学英文版》2006,11(6):1805-1808
Current delegation mechanism of grid security infrastructure (GSI) can't satisfy the requirement of dynamic, distributed and practical security in grid virtual organization. To improve this situation, a TC-enabled GSI is discussed in this paper. With TC-enabled GSI, a practical delegation solution is proposed in this paper through enforcing fine granularity policy over distributed platforms with the emerging trusted computing technologies. Here trusted platform module is treated as a tamper-resistance module to improve grid security infrastructure. With the implement of Project Daonity, it is demonstrated that the solution could gain dynamic and distributed security in grid environment. 相似文献
9.
在第3版WLAN鉴别基础设施(WAI)协议的基础上,提出了基于预共享密钥模式和基于证书模式的可信环境下的WLAN接入认证方案.实现了站(STA)和接入点(AP)之间的双向用户认证和平台认证,且与第3版WAI协议后向兼容,其中鉴别服务器(AS)负责STA和AP的用户证书验证、平台证明身份密钥(AIK)证书验证和平台完整性评估,STA和AP的存储完整性度量日志(SML)是利用数字信封技术加密传输给AS的,从而有效地解决了可信WAI(TWAI)所存在的问题.此外,利用针对于可信接入认证协议的串空间模型,证明了它们是安全的. 相似文献
10.
HUANG Qiang SHEN Changxiang FANG Yanxiang 《武汉大学学报:自然科学英文版》2007,12(1):13-16
With analysis of limitations Trusted Computing Group (TCG) has encountered, we argued that virtual machine monitor (VMM) is the appropriate architecture for implementing TCG specification. Putting together the VMM architecture, TCG hardware and application-oriented "thin" virtual machine (VM), Trusted VMM-based security architecture is present in this paper with the character of reduced and distributed trusted computing base (TCB). It provides isolation and integrity guarantees based on which general security requirements can be satisfied. 相似文献
11.
FANG Yanxiang SHEN Changxiang XU Jingdong WU Gongyi 《武汉大学学报:自然科学英文版》2006,11(6):1424-1428
This paper fist gives an investigation on trusted computing on mainstream operation system (OS). Based on the observations, it is pointed out that Trusted Computing cannot be achieved due to the lack of separation mechanism of the components in mainstream OS. In order to provide a kind of separation mechanism, this paper proposes a separated domain-based kernel model (SDBKM), and this model is verified by non-interference theory. By monitoring and simplifying the trust dependence between domains, this model can solve problems in trust measurement such as deny of service (DoS) attack, Host security, and reduce the overhead of measurement. 相似文献
12.
CHEN Shuyi WEN Yingyou ZHAO Hong 《武汉大学学报:自然科学英文版》2006,11(6):1507-1510
0 IntroductionThe purpose of trusted computingis to solve some of to-day’s security problems through hardware changes topersonal computer . The trusted property can be extendedfromroot of trust to entire PC platformthrough the chain oftrust[1].Root of trustis a small hardware device calledtrustedplatform module (TPM) addedto PC.A well-known project of trusted computing is trustedcomputing platformalliance(TCPA) .It is calledtrusted com-puting group (TCG) now[2 ,3]. Besides this , other… 相似文献
13.
基于可信计算思想提出了一个车联网云平台用户间的安全通信模型.该模型借助可信第三方,在申请通信服务过程中为车联网云用户生成临时身份,即对车联网云用户身份进行匿名化处理,以实现对用户身份隐私的保护.在通信过程中,该模型采用双线性对签名的算法分别对用户的身份合法性和平台可信性进行认证,并有效地使用了随机数、密钥和时间戳,以密钥和散列函数确保了签名的不可伪造性,以时间戳确保了密钥的时效性,以随机数机制防止了重放攻击.分析结果表明:在车联网云平台中采用该通信模型可以使通信过程具备可信性、安全性和匿名性. 相似文献
14.
可信模块与强制访问控制结合的安全防护方案 总被引:1,自引:0,他引:1
基于可信计算思想,通过在现有移动终端中加入移动可信计算模块,并在核心网中加入安全服务提供者和安全软件提供商,构架了面向移动终端的统一安全防护体系,为用户提供安全服务.该方案有效利用了移动终端操作系统的特性,将基于角色的访问控制与可信验证相结合,实现了高效的可信链传递,使没有授权证书的非法软件和非法进程不能在系统中运行,... 相似文献
15.
ZHOU Zheng ZHANG Jun LI Jian LIU Yi 《武汉大学学报:自然科学英文版》2006,11(6):1437-1440
0 IntroductionEventhoughsignificant achievement has been madeinre-search of characteristic and abnormal actions of comput-er virus and attack, the investigation of defending the un-known computer virus and attackis progressing much slower .Under the conditions that attackers are much clever , newcomputer virus is presented continuously,the difference be-tween computer virus and normal programis less and lessclear ,detecting computer virus and attack will be more andmore difficult .Andto be the… 相似文献
16.
TUGuo-qing ZHANGHuan-guo WANGLi-na YUDan-dan 《武汉大学学报:自然科学英文版》2005,10(1):35-38
To build a trusted platform based on Trusted Computing Platform Alliance (TCPA)‘s recommendation, we analyze the integrity mechanism for such a PC platform in this paper. By combinning access control model with information flow model, we put forward a combined process-based lattice model to enforce security. This model creates a trust chain by which we can manage a series of processes from a core root of trust module to some other application modules. In the model,once the trust chain is created and managed correctly,the integrity of the computer‘s hardware and sofware has been mainfained, so does the confidentiality and authenticity. Moreover, a relevant implementation of the model is explained. 相似文献
17.
SHI Wenchang 《武汉大学学报:自然科学英文版》2006,11(6):1493-1497
Trusted path is one of the crucial features that operating systems must provide for fundamental security support. In order to explore the possibility of implementing a trusted path mechanism with the support of trusted platform module (TPM) technologies, and to support TPM capabilities in operating systems, the paper extended the scope of the conventional trusted path to cover the situation in which a user communicates with software residing on a remote host. The paper combined the concept of operating system support for trusted path with that for TPM platforms, and proposed the architecture of an extended trusted path mechanism in operating system with considerations on TPM-capable platforms support. As part of the author's research in secure operating systems, the work of the paper was carried out with Linux as an experimental prototype system. The research result shows that TPM capabilities can strengthen extended trusted path mechanisms of operating systems. 相似文献
18.
ZHANG Miao XU Guoai HU Zhengming YANG Yixian 《武汉大学学报:自然科学英文版》2006,11(6):1429-1432
The conception of trusted network connection (TNC) is introduced, and the weakness of TNC to control user's action is analyzed. After this, the paper brings out a set of secure access and control model based on access, authorization and control, and related authentication protocol. At last the security of this model is analyzed. The model can improve TNC's security of user control and authorization. 相似文献
19.
It is absolutely critical that trusted configuration management which significantly affects trust chain establishment, sealing storage and remote attestation, especially in trusted virtualization platform like Xen whose system configuration changes easily. TPM (trusted platform module) context manager is presented to carry out dynamic configuration management for virtual machine. It manages the TPM command requests and VM (virtual machine) configurations. The dynamic configuration representa- tion method based on Merkle hash tree is explicitly proposed against TCG (trusted computing group) static configuration representation. It reflects the true VM status in real time even if the configuration has changed, and it eliminates the invalidation of configuration representation, sealing storage and remote attestation. TPM context manager supports TCG storage protection, remote attestation etc, which greatly enhances the security on trusted virtualization platform. 相似文献
20.
一种动态软件水印算法 总被引:2,自引:0,他引:2
提出一种基于CT算法的动态软件水印算法,改变CT算法先构建水印拓扑图再分割的思路,运用中国剩余定理直接对软件水印信息本身进行分割的策略,提高了水印分割的效率,并提出了经过分割后的软件水印的检测算法. 相似文献