期刊文献+

基于安全控制模块的高可信计算机研究 被引量:4

High trusted computer based on security control module
在线阅读 下载PDF
导出
摘要 当前的可信计算机主要关注于TPM安全芯片的集成与应用,在可信根保护、文件加密存储和系统安全防护方面存在不足。在参考可信计算技术的基础上,提出了一种以内嵌的安全控制模块为物理信任根的高可信计算机解决方案。论述了整体的组成结构、工作原理,详细分析了高可信计算机中安全控制模块和可信BI-OS的实现机制。相关实验结果验证了高可信计算机平台设计方案的有效性。 At present,the integration and application of TPM security chip is mainly focused on,however the existing trusted computer has some shortages in root of trust protection,encryption storage of files and system security protection.Based on the trusted computing technology,a high trusted computer is put forward to solve the above problems,in which security control module is the physical trust root.The architecture and working principle of the high trusted computer is described.Meanwhile,the implementation of security control module and the trusted BIOS are analyzed in detail.The applicability of the proposed method is validated by a detailed experimental results.
出处 《系统工程与电子技术》 EI CSCD 北大核心 2010年第2期437-440,共4页 Systems Engineering and Electronics
关键词 网络安全 可信计算 安全控制模块 可信BIOS network security trusted computing security control module trusted BIOS
  • 相关文献

参考文献9

  • 1Vaughan-Nichols S J. How trustworthy is trusted computing[J]. IEEE Computer, 2003, 36(3) : 18 - 20.
  • 2Algridas A, Laprie J C, Brian R, et al. Basic concepts and taxonomy of dependable and secure computing[J]. IEEE Trans. on Dependable and Secure Computing, 2004, 1(1): 11 - 33.
  • 3Lampson P, Manferdelli B, WiUam J. A trusted open platform[J]. IEEE Computer, 2003, 36(7):55- 62.
  • 4Pandora E. Spyware, adware, autoexecution, and NGSCB[J]. Computer Security, 2003, (5) :366 - 377.
  • 5Dornan A. Trusted computing architectures[J]. Network Magazine, 2005, 20(7) :53 - 55.
  • 6沈昌祥,张焕国,冯登国,曹珍富,黄继武.信息安全综述[J].中国科学(E辑),2007,37(2):129-150. 被引量:364
  • 7王斌,吴钦章,王春鸿.一种可信安全仿真计算机设计[J].系统工程与电子技术,2008,30(12):2502-2505. 被引量:3
  • 8张兴,沈昌祥.一种新的可信平台控制模块设计方案[J].武汉大学学报(信息科学版),2008,33(10):1011-1014. 被引量:17
  • 9林宝如,张帆,陈怡.嵌入式计算机系统的USB主机驱动分析[J].重庆大学学报(自然科学版),2008,31(3):324-327. 被引量:3

二级参考文献34

共引文献380

同被引文献17

  • 1Wei Y, Ansari N. Why anti-virus products slow down your machine? [C] //ffProceeding of 18th International Conference on Computer Communications and Networks. San Francisco: IEEE, 2009: 1-6.
  • 2Jon O, Evan C, Farnam J. Rethinking antivirus: executable analysis in the network cloud[C]//Proceedings of 2nd USENIX Workshop on Hot Topics in Security. Boston: USENIC Association, 2007: 1-5.
  • 3Igor M, Chris B. Cloud security technologies[J]. Information Security Technical Report, 2009, 14 (1):1-6.
  • 4Jon O, Evan C, Famam. J. CloudAV: n-version antivirus in the network cloud[C] ff Proceedings of the 17th USENIX Security Symposium. San Jose: ACM, 2008: 91-107.
  • 5Cristian A M, Gustavo I E, Andes G C S. Malware detection based on cloud computing integrating intrusion ontology representation [C] // Proceedings of 2010 IEEE Latin-American Conference Communications Conference Proceedings. Bogota: IEEE, 2010 : 1-6.
  • 6Liu S T, Chen Y M. Retrospective detection of malware attacks by cloud computing[C]//Proceedings of 2010 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery. Huangshan: IEEE, 2010: 510-517.
  • 7Lorenzo M, Roberto P, Danilo B. A framework for behavior-based malware analysis in the eloud[C]// Proceedings of the 5th International Conference on Information Systems Security. Kolkata: Springer Berlin Heidelberg, 2009: 178-192.
  • 8Andy M, Russ D, Tim H, et al. The cloud and SOA: creating an architecture for today and for the future[EB/OL]. [2014-04-11]. http://www, hp. com/hpinfo/analystrelations/wp-cloudcomputing soa_capgemini_hp, pdf.
  • 9Dhruba B. The hadoop distributed file system: ar chitecture and design [ EB/OL]. [ 2014-04-11]. http:// hadoop. apache. org/does/r0. 18. 0/hdfs_design. pdf.
  • 10Wiki. Sahara[EB/OL] [2015-02-10]. https://wikl. openstack. org/wiki/Sahara.

引证文献4

二级引证文献7

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部