期刊文献+

基于TPM的虚拟机安全协议的研究

Research on Virtual Machine System Security Protocols Based on TPM
在线阅读 下载PDF
导出
摘要 研究并分析现有的一些基于TPM的虚拟机安全协议,分析协议的一些不足和不完善的地方,针对这些协议的不足,提出一种改进的协议,并补充一种新的协议。 This paper makes some research on TPM-based security protocols of virtual machine systems,analyzes these protocols and finds some defects,then proposes an improved protocol and a complementary protocol.
作者 罗旭富 骆源
出处 《计算机与现代化》 2013年第7期30-33,共4页 Computer and Modernization
关键词 虚拟机 安全协议 TPM virtual machine secure protocols TPM
  • 相关文献

参考文献12

  • 1刘谦,骆源,翁楚良,李明禄.基于可信平台模块的虚拟机安全协议[J].信息安全与技术,2010,1(6):49-55. 被引量:5
  • 2周建峰,马玉祥,欧阳雄.PKI信任模型研究[J].电子科技,2006,19(4):75-78. 被引量:7
  • 3Jenni Susan Reuben. A survey on virtual machine security[C]// TKK T-110.5290 Seminar on Network Security. 2007..
  • 4秦中元,沈日胜,张群芳,狄予兴.虚拟机系统安全综述[J].计算机应用研究,2012,29(5):1618-1622. 被引量:24
  • 5Trusted Computing Group. TCG Specification[EB/OL]. https://www.trustedcomputinggroup.org, 2013-02-01..
  • 6Trusted Computing Group. TCG Specification Architecture Overview, Specification Revision 1.4[EB/OL]. http://www.trustedcomputinggroup.org/files/resource_files/AC652DE1-1D09-3519-ADA026A0C05CFAC2/TCG_1_4_Architecture_Overview.pdf, 2007-08-02..
  • 7Trusted Computing Group. TPM Main Part 1 Design Principles_ Specification Version 1.2. 2005[EB/OL]. http://www.trustedcomputinggroup.org/files/resource_files/845D2365-1D09-3519-AD77B79A36A2ECC1/TPM%20main%201.2, %20rev85%20part%201.pdf, 2005-02-13..
  • 8英特尔开源软件技术中心,复旦大学并行处理研究所.系统虚拟化:原理与实现[M].北京:清华大学出版社,2009.
  • 9Perlman R. An overview of PKI trust models[J]. IEEE Network, 1999,13(6):38-43..
  • 10Advanced Micro Devices, Inc. AMD Virtualization[EB/OL]. http://sites.amd.com/us/business/it-solutions/virtualization/Pages/virtualization.aspx, 2013-02-01..

二级参考文献41

  • 1周建峰,马玉祥,欧阳雄.PKI信任模型研究[J].电子科技,2006,19(4):75-78. 被引量:7
  • 2BINU A,KUMAR G S.Virtualization techniques:a methodical reviewof Xen and KVM[C]//Proc of the 1st International Conference onAdvances in Computing and Communications.Berlin:Springer-Verlag,2011:399-410.
  • 3WANG Xi,CHENG Chuan.Access control using trusted virtual ma-chine based on Xen[C]//Proc of International Conference on AppliedInformatics and Communication.Berlin:Springer-Verlag,2011:94-101.
  • 4SALAUN M.Practical overview of a Xen covert channel[J].Journalin Computer Virology,2010,6(4):317-328.
  • 5PRICE M.The paradox of security in virtual environments[J].Com-puter,2008,41(11):22-28.
  • 6IDC.New IDC IT cloud services survey:top benefits and challenges[EB/OL].(2009-11-15).http://blogs.idc.com/ie/?p=730.
  • 7BARHAM P,DRAGOVIC B,FRASER S,et al.Xen and the art ofvirtualization[C]//Proc of the 19th ACM Symposium on OperatingSystems Principles.New York:ACM Press,2003:164-177.
  • 8ZHANG Xiao-tao,DONG Yao-zu.Optimizing Xen VMM based on In-telvirtualization technology[C]//Proc of International Conferenceon Internet Computing in Science and Engineering.Washington DC:IEEE Computer Society,2008:367-374.
  • 9BRATUS S,LOCASTO M E,RAMASWAMY A,et al.Traps,events,emulation,and enforcement:managing the Yin and Yang of virtualiza-tion-based security[C]//Proc of the 1st ACM Workshop on VirtualMachine Security.New York:ACM Press,2008:49-58.
  • 10LIU Dong-xi,LEE J,JANG Ju-lian,et al.A cloud architecture of vir-tual trusted platform modules[C]//Proc of IEEE/IFIP InternationalConference on Embedded and Ubiquitous Computing.WashingtonDC:IEEE Computer Society,2010:804-811.

共引文献43

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部