期刊文献+

对移动可信模块安全体制的研究 被引量:2

Research on security mechanism of mobile trusted module
在线阅读 下载PDF
导出
摘要 介绍了基于可信计算的移动可信模块(MTM)的设计思想,引入了移动远程所有者可信模块(MRTM)和移动本地所有者可信模块(MLTM),以满足不同利益相关者的需求。比较了MTM和TPM在安全模型上的区别,给出了实现可信机制的过程。MTM不仅满足了TPM的基本可信特性,还允许多方信任设备和组件一起工作,共享同样的安全架构,体现了移动设备的特性。 To introduce the mechanism of mobile trusted module on trusted computing, which is based mobile remote-owner trusted module (MRTM) and mobile local-owner trusted module (MLTM) to fulfil the need of plenty of stakeholders. The difference of MTM and TPM on the security model is compared, then the process implementing trusted computing is given. MTM not only achieve the trust property of TPM, but also permit various kinds of trusted device and module to work together and share the same security structure in- carnating the speciality of mobile device.
出处 《计算机工程与设计》 CSCD 北大核心 2007年第19期4612-4615,共4页 Computer Engineering and Design
  • 相关文献

参考文献11

  • 1Benoit O,Dabbous N,Gauteron L.Mobile terminal security[EB/OL].http://eprint.iacr.org/2004/158.pdf,CryptologyePrint Archive,2004.
  • 2Kaspersky Lab.Mobile malware evolution[EB/OL].http://www.viruslist.com/en/analysis? pubid=200119916.
  • 3Raghunathan A,Ravi S,Hattangady S,et al.Securing mobile appliances:New challenges for the system designer[C].Munich,Germany:Proceedings of the Design,Automation and Test in Europe Conference and Exhibition,2003.
  • 4NTT DoCoMo,IBM,Intel Corporation.Trusted mobile platform protocol specification document-Revision 1.00[EB/OL].http://www.trusted-mobile.org,2004-04-05.
  • 5Trusted Computing Group.Mobile trusted module specification Reversionl[EB/OL].https://www.trustedcomputinggroup.org/specs/mobilephone,2006-09-12.
  • 6Kuntze N,Schmit U A.Trusted computing in mobile action[C].Sandton,South Africa:Peer-reviewed Proceedings of the Information Security South Africa from Insight to Foresight Conference,2006.
  • 7Pisko Evgenia,Rannenberg Kai,Rossnagel Heiko.Trusted computing in mobile platforms,players,usage scenarios,and interests[J].Datenschutz und Datensicherheit,2005,29(9):526-530.
  • 8马洁,林中.针对可移动设备的TCG软件协议栈的扩充[J].计算机工程与设计,2006,27(19):3586-3588. 被引量:2
  • 9Trusted Computing Group.TPM main part 1 design principles,TPM specification version 1.2 revision 94[EB/OL].www.trustedcomputinggroup.org,2006-03-29.
  • 10Trusted Computing Group.TPM main part 2 TPM structures,TPM specification Version 1.2 revision 94[EB/OL].www.trustedcomputinggroup.org,2006-03-29.

二级参考文献10

  • 1YAU S,WANG Y,KARIM F.Developing situation-awareness in middleware for ubicomp environments[J].Computer Software and Applications Conference,2002,26 (13):233-238.
  • 2Ratna Bearavolu,Kiran Lakkaraju,William Yurcik,et al.A visualization tool for situational awareness of tactical and strategic security events on large and complex computer networks[J].IEEE Military Communications Conference (Milcom),2003,12(5):75-88.
  • 3Bruce Schneier.应用密码学[M].第1版.北京:机械工业出版社,2000.
  • 4TCPA.TPM protection profile v1.9.7,TCPA[EB/OL].2005-08-15.www.trustedcomputing.org/home.
  • 5TCG software stack (TSS) specification version1.10 golden,TCG 2003[EB/OL].2005-09-01.http://www.trustedcoputing.org.
  • 6MUIJ.Decoding mobile device security[EB/OL].2005-06-07.http://www.computerworld.com/mobile/mobiletop ics/mobile.
  • 7Reidj Dawsone.Privacy and trusted computing[C].Proceedings of the 14th International Workshop on Database and Expert System Application,2003.
  • 8Beno Ito,Dabbousn,Gauteron L.Mobile terminal security[R].Cryp tology ePrint Archive,2004.
  • 9Perelson S,Botha R.An investigation into access control for mobile devices[EB/OL].2004.http://www.infosecsa.co.za/proceed2 ings2004/035.pdf.
  • 10孔维广.可信计算平台的工作原理与应用研究[J].武汉科技学院学报,2003,16(6):81-84. 被引量:11

共引文献1

同被引文献10

引证文献2

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部