首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到19条相似文献,搜索用时 125 毫秒
1.
针对计算机可信计算设计理念中存在的WSN终端数据安全问题,提出了一种基于可信计算的无线传感器网络终端身份认证机制。通过引入可信平台模块(TMP),结合生物识别技术的思想,实现用户与TMP之间的相互认证,由TPM直接控制指纹模板和生物校验软件,渐少了数据传输过程中可能发生的潜在威胁,提高了无线传感器网络终端的可靠性。分析认为,该方案对可信计算在终端安全方面的研究有着重要的参考价值。  相似文献   

2.
随着云计算的普遍应用,使云计算安全问题成为业界关注热点.用户在享受云计算提供的资源和计算等服务时,面临非法入侵和隐私泄露等威胁.为了解决云计算安全问题,需要建立一种安全可信机制,保障系统和应用的安全性.把可信计算技术应用到终端设备上,从"信任根"出发,借助"信任链"把可信逐级传递下去,最终扩展到整个终端计算系统都是安全可信的.  相似文献   

3.
针对普通嵌入式设备引导过程中的安全隐患,在分析Marvell公司的PXA微处理器的基本特性和结构的基础上,借鉴可信计算思想,加入可信密码模块(trusted cryptography module,TCM)和可恢复性机制,设计了一种基于PXA微处理器的可信引导方案,并将其应用到移动警务终端。该方案确保了设备在启动过程中的完整性,有效地防止了程序被篡改,在一定程度上提升了设备运行的安全性和可靠性。  相似文献   

4.
童辉 《科技资讯》2013,(32):25-26
将可信计算引入到移动电子支付系统中,是一条有效解决移动电子支付设备安全问题的新思路。本文首先对可信计算的体系结构进行介绍,之后对在传统可信计算平台上构建适应移动环境的新型嵌入式可信平台模块进行阐述,并重点介绍了其硬件和软件环境的实现,为用户提供一个安全,便捷的支付环境。  相似文献   

5.
以MTM规范为基础,提出了基于设备识别和改进型权限鉴别模型的可信平台架构,并对架构中模块的可行性进行论证和实现。Android可信权限系统通过加密和鉴权方法为运行软件创建运行时空安全域以确保其安全,提供了系统级、应用级和环境级的可信认证。经过对三种移动平台安全防护产品的对比研究评估了系统的表现效果,发现该系统能够无误完成设备认证工作,对非法文件访问和跳转请求具有80%以上的识别概率,达到了提高移动终端可信度的目的。  相似文献   

6.
基于信任管理模型的移动Agent安全机制研究   总被引:3,自引:0,他引:3  
针对移动Agent系统的安全问题,分析了信任管理模型的概念及其形式化定义.基于可信计算的相关思想,在传统安全管理的基础上融合了基于动态信任管理模型的安全体系结构并对相关关键算法进行了设计,同时与传统的安全性能进行了对比和分析.  相似文献   

7.
当计算技术发展到一定成熟阶段后,对可信的需求便显得迫切而关键.首先简要介绍了可信计算技术的发展历程,然后重点研究和探讨了可信计算中居于领先地位的TCPA和微软提出的下一代安全计算基(NGSCB),最后给出了1个简单的基于可信计算的内部网安全解决方案.  相似文献   

8.
为解决分布式网络管理的安全问题,利用移动Agent框架作为底层平台,应用VMC概念将移动Agent和SNMP Agent相融合,构建一种基于可信移动Agent的安全体系结构.实验结果表明,采用此体系结构的网络管理系统能够确保移动Agent的可信性.因此,该体系结构在受到Agent到Agent平台或Agent到Agent攻击情况下的安全性得到评估,证明在网络管理任务中其性能是可信的.  相似文献   

9.
云端融合计算将云计算和对等计算有机地融合,充分挖掘网络中心集群服务器端和网络边缘终端所蕴含的各种可利用的资源。引入了动态性比较强的网络边缘节点之后,云端融合计算环境下的数据安全保护和远程数据销毁更加困难,特别是恶意的异地主体可能对被托管的数据实施非法篡改等攻击行为。为此,本文提出了基于移动Agent的防御性数据销毁机制,利用移动Agent对云端数据进行检测,将待上传密文数据的HASH值拼接在密文后面,并定时对数据进行双重检测,有效区分云端数据的正常修改和非法篡改。通过预测相关数据受攻击的可能性,对已被非法篡改或有被非法篡改可能性的数据进行有效处理。设计并构建了基于移动Agent的云端数据防御性数据销毁原型系统。实验结果表明,基于移动Agent的防御性数据销毁机制在检测准确性、安全性、时间开销等方面具有良好的性能表现。   相似文献   

10.
介绍了网络可信平台的研究与实现,采用可信度量机制以保证网络计算终端的安全为基础,利用远程证明机制对网络接入终端的可信性验证,根据验证结果决定对整个网络计算环境的访问控制,利用传统网络安全技术和可信计算技术实现了全新的网络安全体系结构.  相似文献   

11.
基于可信计算的移动平台设计方案   总被引:3,自引:0,他引:3  
在深入研究现有可信移动平台设计方案和TCG移动可信模块相关技术的基础上,提出了带有移动可信模块的可信移动平台设计方案.平台采用基带处理器和应用处理器分离的结构,利用移动可信模块构建了以应用处理器为中心的可信区域,为移动平台提供受保护的计算和存储空间,提高了移动平台的安全性、灵活性和可靠性.分析了现有可信移动平台安全引导过程安全漏洞,提出了改进的安全引导过程,并通过谓词逻辑对改进的引导过程进行了正确性验证.  相似文献   

12.
In this paper, we propose a trusted mobile payment environment (TMPE) based on trusted computing and virtualization technology. There are a normal operating system (OS) and a trusted OS (TOS) in TMPE. We store the image of TOS in a memory card to hinder tampering. The integrity of TOS is protected by means of a trusted platform module (TPM). TOS can only be updated through a trusted third party. In addition, virtualization technology is applied to isolate TOS from normal OS. Users complete ordinary affairs in normal OS and security-sensitive affairs in TOS. TMPE can offer users a highly protected environment for mobile payment. Moreover, TMPE has good compatibility in different hardware architectures of mobile platforms. As the evaluation shows, TMPE satisfies the requirement of mobile payment well.  相似文献   

13.
14.
Trusted path is one of the crucial features that operating systems must provide for fundamental security support. In order to explore the possibility of implementing a trusted path mechanism with the support of trusted platform module (TPM) technologies, and to support TPM capabilities in operating systems, the paper extended the scope of the conventional trusted path to cover the situation in which a user communicates with software residing on a remote host. The paper combined the concept of operating system support for trusted path with that for TPM platforms, and proposed the architecture of an extended trusted path mechanism in operating system with considerations on TPM-capable platforms support. As part of the author's research in secure operating systems, the work of the paper was carried out with Linux as an experimental prototype system. The research result shows that TPM capabilities can strengthen extended trusted path mechanisms of operating systems.  相似文献   

15.
The most significant strategic development in information technology over the past years has been "trusted computing" and trusted computers have been produced. In this paper trusted mechanisms adopted by PC is imported into distributed system, such as chain of trust, trusted root and so on. Based on distributed database server system (DDSS), a novel model of trusted distributed database server system (TDDSS) is presented ultimately. In TDDSS role-based access control, two-level of logs and other technologies are adopted to ensure the trustworthiness of the system.  相似文献   

16.
0 IntroductionPeople need a secure and dependable computing environ-ment[1]. The cryptology is known as the core of com-puter security[2]. The application of cryptologyis mainly ful-filled by key management and credential mechanism.In thispaper , we should study the key management and credentialmechanismbased ontrusted computing platform,and give theactual application of these security mechanisms for buildingtrusted computing environment .1 OverviewTrusted Computing1 .1 The Original of Trus…  相似文献   

17.
针对可信度量现存问题,依据软件安全保护原则提出通过融合多方度量因子建立综合的可信度量模型——随机抽取划分序列策略模型。该模型兼顾了软件安全度需求系数、软件安全度评估系数及软件执行所需资源开销系数等多方因素,摒弃了传统单一的度量方法,建立了综合性的可信度量策略及构造方法,兼顾了多方面安全需求问题,并且实现了细粒度完整性检验,降低了可信度量的运算开销。  相似文献   

18.
Pervasive computing environment is a distributed and mobile space. Trust relationship must be established and ensured between devices and the systems in the pervasive computing environment. The trusted computing (TC) technology introduced by trusted computing group is a distributed-system-wide approach to the provisions of integrity protection of resources. The TC's notion of trust and security can be described as conformed system behaviors of a platform environment such that the conformation can be attested to a remote challenger. In this paper the trust requirements in a pervasive/ubiquitous environment are analyzed. Then security schemes for the pervasive computing are proposed using primitives offered by TC technology.  相似文献   

19.
This paper, focusing on the trusted computing group's standards, explained the key concept of trusted compuling and provided the architecture of trusted PC. It built trust bottom-up by starting with trusted hardware and adding layers of trusted software. It is a system-level solution available to all applications running on the member platforms. This solution reduces the security burden on applications and thus simplifies application programming.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号