期刊文献+

利用DTE技术的证明系统安全域模型研究

A DTE-based Security Domain Model for the Attestation System
原文传递
导出
摘要 为了解决证明系统中存在的完整性保护不足的问题,对完整性策略和保护机制进行了研究,提出了一种基于DTE技术的证明系统安全域模型。该模型将证明系统按照功能特性划分为若干安全域,并且定义了模型变量以及安全规则。同时,为了确保不同域之间能够安全传输,在模型中引入了可信管道的概念。给出了安全域模型的实现方法和管道协议,并对管道协议进行了安全性分析和证明。 In order to solve the problem of lacking protection of integrity in the attestation system,we study the integrity policies and protection mechanism,and present a DTE-based security domain model for the attestation system.The model separates the attestation system into several security domains according to the different functional features,and defines its variables and security regulations related to the attestation system.At the same time,in order to ensure secure transmission between domains,the concept of trusted pipeline is proposed in the model.Finally we give the implementation of the security domain model and the pipeline protocol,and analyze and prove the security of the pipeline protocol.
出处 《武汉大学学报(信息科学版)》 EI CSCD 北大核心 2010年第5期537-541,共5页 Geomatics and Information Science of Wuhan University
基金 国家863计划资助项目(2006AA01Z440 2009AA012437) 国家973计划资助项目(2007CB311100) 核安全与仿真技术国防重点学科实验室开放研究基金资助项目(HEUFN0801) 北京工业大学博士创新基金资助项目(bcx-2009-066)
关键词 证明系统 安全域 可信管道 attestation system security domain trusted pipeline
  • 相关文献

参考文献9

  • 1Sadeghi A R, Stuble C. Property-based Attestation for Computing Platforms: Caring about Properties, not Mechanisms[C].The 2004 Workshop on New Security Paradigms, Nova Scotia, Canada, 2004.
  • 2Haldar V, Chandra D,Franz M. Semantic Remote Attestation-a Virtual Machine Directed Approach to Trusted Computing[C].The 3rd Virtual Machine Research and Techonolgy Symposium USENIX, San Jose, California, 2004.
  • 3Sailer R, Zhang Xiaolan, Jaeger T, et al. Design and Implementation of a TCG-based Integrity Measurement Architecture[C]. The 13th Conference on USENIX Security Symposium, Berkeley, CA, USA, 2004.
  • 4Li Xiaoyong, Shen Changxiang, Zuo Xiaodong. An Efficient Attestation for Trustworthiness of Computing Platform[C]. Intelligent Information Hiding and Multimedia Signal Processing, Pasadena, CA, USA, 2006.
  • 5何建波,郭新,卿斯汉.一种基于TE技术实现Clark-Wilson模型的方法[J].电子学报,2008,36(2):216-223. 被引量:2
  • 6季庆光,卿斯汉,贺也平.基于DTE技术的完整性保护形式模型[J].中国科学(E辑),2005,35(6):570-587. 被引量:4
  • 7卿斯汉,李丽萍,何建波,沈晴霓.基于DTE策略的安全域隔离Z形式模型[J].计算机研究与发展,2007,44(11):1881-1888. 被引量:6
  • 8Hallyn S E, Kearns P. Domain and Type Enforcement for Linux[C]. The 4th Annual Linux Showcase & Conference, Atlanta, Georgia,2000.
  • 9Badger L, Sterne D F, Sherman D L, et al. Haghighat, TA Domain and Type Enforcement UNIX Prototype TTT[C]. The 5th USENIX UNIX Security Symposium, Salt Lake City, Utah, 1995.

二级参考文献63

  • 1LIANGBin SHIWenchang SUNYufang SUNBo.An Approach to Enforcing Clark-Wilson Model in Role-based Access Control Model[J].Chinese Journal of Electronics,2004,13(4):596-599. 被引量:2
  • 2Jueneman R R. Integrity controls for military and commercial applications. Fourth Aerospace Computer Security Applications Conference. Florida: IEEE Computer Society Press, 1988. 298~322.
  • 3Ruthberg Z G, Polk W T. Report of the Invitational Workshop on Data Integrity. National Institute of Standards and Technology, September 1989. NIST Special Publication 500-168.
  • 4Mayfield T, Boore J M, Welke S R. Integrity-oriented control objectives: proposed revisions to the trusted computer systems evaluation criteria (TCSEC, DoD5200.28.STD), IDA document D-967, prepared for National Security Agency (U. S.), available at http:∥www.mirrors.wiretapped.net/security/info/reference /ncsc-publications/C-TR- 111-91 .pdf.
  • 5Information Technology-Security Techniques-Evaluation Criteria for IT Security - Part 2: Security Functional Requirements. ISO/IEC 15408-2, 1999, International Standards Organization.
  • 6Abrams M D, Joyce M V. Trusted system concepts. Computers and Security, 1995, 14(1): 45~56.
  • 7Bell D E. Modeling the "multipolicy machine", in Proceedings of the 1994 ACM SIGSAC on New Security Paradigms Workshop, August 1994, Little Compton, RI USA. 2~9.
  • 8Mayfield T, Roskos J E, Welke S R, et al. Integrity in Automated Information Systems. NCSC Technical Report. National Computer Security Center, 1991.
  • 9Sandhu R S. On five definitions of data integrity. In: Proceedings of the IFIP WG11.3 Workshop on Database Security, Alabama: Lake Guntersville, 1993.
  • 10LaPadula L J. Rule-set modelling of a trusted computer system. In: Abrams M D, Jajodia S, Podell H J,eds. Information Security: An Integrated Collection of Essays. Los Alamitos: IEEE Computer Society Press, 1995.

共引文献9

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部