期刊文献+

可信计算平台信任链安全性分析 被引量:19

Security Analysis on Trust Chain of Trusted Computing Platform
在线阅读 下载PDF
导出
摘要 可信计算规范是指导可信计算产品研制的依据,可信计算规范本身的安全性需要得到验证.信任链是可信计算平台中保障系统安全可靠的主要技术手段,它是可信计算平台整个系统安全的中心问题.针对可信计算平台信任链规范的信息流安全问题,文中通过安全进程代数对信任链系统接口进行形式化建模,用可复合的不可演绎模型刻画信任链实体间的交互关系,把规范定义的信任链行为特性抽象为多级安全输入输出集,在讨论高级和低级输入输出依赖关系的基础之上,对信任链复合系统进行信息流分析,并给出结论和证明. The specifications of trusted computing are guidance for products. But securities of specifications themselves need to be verified. The chain of trust is the key technical method to assure system security and is the focus of security in trusted computing platform. Aiming at information flow issue on specification of chain of trust, this paper uses secure process algebra to model trust chain, and describes mutual relationships between entities by non deducibility on composition, and abstracts the behavior and characters of specification of trust chain to multi-level secure inputs and outputs. After discussing associated relations of I/O of high level and low level, we analyzed the system of trust chain. Finally we put forward some conclusions and sounds prove.
出处 《计算机学报》 EI CSCD 北大核心 2010年第7期1165-1176,共12页 Chinese Journal of Computers
基金 国家"八六三"高技术研究发展计划项目基金(2007AA01Z411) 国家自然科学基金(60673071)资助~~
关键词 信任链 安全进程代数 可复合的不可演绎模型 chain of trust secure process algebra non deducibility on composition
  • 相关文献

参考文献22

  • 1张焕国,严飞,傅建明,徐明迪,杨飏,何凡,詹静.可信计算平台测评理论与关键技术研究[J].中国科学:信息科学,2010,40(2):167-188. 被引量:13
  • 2Abadi M,Wobber T.A logical account of NGSCB//Proceedings of the Formal Techniques for Networked and Distributed Systems,FORTE 2004.Madrid,Spain.LNCS 3235.2004:1-12.
  • 3Chen S,Wen Y,Zhao H.Formal analysis of secure bootstrap in trusted computing//Proceedings of the 4th International Conference on Autonomic and Trusted Computing.Hong Kong,China.LNCS 4610.Springer,2007:352-360.
  • 4Gürgens S,Rudolph C,Scheuermann D et al.Security evaluation of scenarios based on the TCG's TPM specification//Biskp Joachim,Lopez Javier eds.Proceedings of the 12th European Symposium on Research in Computer Security(ESORICS).Dresder,Germany.LNCS 4734.Springer,2007:438-453.
  • 5Millen J,Guttman J,Ramsdell J et al.Analysis of a measured launck The MITRE Corporation,Bedford,MA:Technical Reports 07-0843,2007.
  • 6Lin A H.Automated analysis of security apis[M.S.dissertation] .Massachusetts Institute of Technology,2005.
  • 7Deepak G,Jason F,Dilsun K et al.Towards a theory of secure systems.Cylab,Carnegie Mellon University,Pattsburgh,PA:Technical Reports CMU-CyLab-08-003,2008.
  • 8Datta A,Franklin J,Garg D et al.A logic of secure systems and its application to trusted computing.Cylab,Carnegie Melon University,Pattsburgh,PA:Technical Reports CMU-Cy-Lab-09-001,2009.
  • 9徐明迪,张焕国,严飞.基于标记变迁系统的可信计算平台信任链测试[J].计算机学报,2009,32(4):635-645. 被引量:19
  • 10周伟,尹青,王清贤.进程代数上的抽象安全性质[J].计算机研究与发展,2005,42(12):2100-2105. 被引量:2

二级参考文献75

共引文献32

同被引文献157

引证文献19

二级引证文献58

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部