期刊文献+

基于无干扰理论的可信链模型 被引量:29

A Noninterference-Based Trusted Chain Model
在线阅读 下载PDF
导出
摘要 可信计算的相关研究已成为当前国内外信息安全方面的研究热点和趋势之一.可信计算技术也成为构建安全计算机系统行之有效的新技术.目前可信计算理论的发展滞后于技术的发展,针对可信计算中可信链传递缺乏理论模型的问题,将无干扰理论引入到可信计算领域,提出了计算机系统可信的基本理论.从动态的角度建立了基于无干扰理论的可信链模型,并对该模型进行了形式化描述和验证,而且实现了基于Linux操作系统内核的可信启动过程.其实现思路对于可信计算理论的发展和应用具有很好的参考价值. The traditional information security systems, such as firewall, intrusion detection and antivirus, are all preventing attacks from the outside. But these methods can't meet the various security requirements. Therefore, experts appeal to solve the problems from the inner. Under this background, TCG proposed the conception of trusted computing. It aims to improve the security on the terminals. At present, trusted computing and its related researches are the focus and trend of information security in inland and oversea. Trusted computing is the foundation of the security, and it may solve the insecure problem caused by the platform of hardware in PC. Trust chain starts from the trust root. TCG introduces the idea of the trusted into the computing environment, but there is still not the formalized uniform description. Trusted computing is still a technology but not a theory, and the basic theory model has not been established. Noninterference theory is introduced into the domain of trusted computing to construct the trusted chain theoretic model. The basic theory of the computing trusted is proposed and a noninterference-based trusted chain model is built from the dynamic point of view, and then the model is formalized and verified. Finally, the process of start up based on Linux operating system kernel is implemented. The implementation provides a good reference for the development and aoolication of the trusted computing theory as well.
出处 《计算机研究与发展》 EI CSCD 北大核心 2008年第6期974-980,共7页 Journal of Computer Research and Development
基金 国家“九七三”重点基础研究发展规划基金项目(2007CB307101) 国家“八六三”高技术研究发展计划基金项目(2007AA01Z410,20060101Z4015)~~
关键词 可信计算 可信计算平台 可信链 无干扰理论 可信根 trusted computing trusted computing platform trusted chain noninterference theory trusted root
  • 相关文献

参考文献20

  • 1Trusted Computing Group. TPM Main Part 1 Design Principles Specification Version 1. 2 [OL]. http://www. trustedcomputinggroup, org, 2003.
  • 2郑志蓉,蔡谊,沈昌祥.操作系统安全结构框架中应用类通信安全模型的研究[J].计算机研究与发展,2005,42(2):322-328. 被引量:6
  • 3周伟,尹青,王清贤.进程代数上的抽象安全性质[J].计算机研究与发展,2005,42(12):2100-2105. 被引量:2
  • 4Trusted Computing Group. TCG Specification Architecture Overview, Version1. 2 [OL]. http://www, trustedcomputinggroup. org, 2003.
  • 5沈昌祥,张焕国,冯登国,曹珍富,黄继武.信息安全综述[J].中国科学(E辑),2007,37(2):129-150. 被引量:364
  • 6张焕国,罗捷,金刚,朱智强,余发江,严飞.可信计算研究进展[J].武汉大学学报(理学版),2006,52(5):513-518. 被引量:119
  • 7Trusted Computing Platform Alliance. TCPA Design Philosophies and Concepts Version 1.0 [OL]. http://www. trustedcomputing, org/docs/designvl_Ofinal, pdf, 2001.
  • 8J Rushby. Noninterference, transitivity, and channel-control security policies [R]. Stanford Research Institute, Tech Rep: CSL-92-02, 1992.
  • 9Microsoft. Security model for the next generation secure computing base [OL]. http://www, microsoft, corn/resources/ ngscb, 2003.
  • 10Intel Corporation. LaGrande Technology Architectural Overview [OL]. http://www, intel, com/technology/security, 2004.

二级参考文献55

共引文献683

同被引文献294

引证文献29

二级引证文献90

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部