期刊文献+
共找到5篇文章
< 1 >
每页显示 20 50 100
Multi-Embed Nonlinear Scale-Space for Image Trust Root Generation 被引量:1
1
作者 Lizhao Liu Wentu Gao +3 位作者 Jian Liu Huayi Yin Huarong Xu Shunzhi Zhu 《China Communications》 SCIE CSCD 2016年第11期170-179,共10页
An image trust root is a special type of soft trust root for trusted computing. However,image trust root generation is difficult,as it needs a corresponding stable logic feature generation model and algorithm for dyna... An image trust root is a special type of soft trust root for trusted computing. However,image trust root generation is difficult,as it needs a corresponding stable logic feature generation model and algorithm for dynamical and sustained authentication. This paper proposes a basic function of constructing new scale-spaces with deep detecting ability and high stability for image features aimed at image root generation. According to the heat distribution and spreading principle of various kinds of infinitesimal heat sources in the space medium,a multi-embed nonlinear diffusion equation that corresponds to the multi-embed nonlinear scale-space is proposed,a HARRIS-HESSIAN scale-space evaluation operator that aims at the structure acceleration characteristics of a local region and can make use of image pixels' relative spreading movement principle was constructed,then a single-parameter global symmetric proportion(SPGSP) operator was also constructed. An authentication test with 3000 to 5000 cloud entities shows the new scale-space can work well and is stable,when the whole cloud has 5%-50% behavior with un-trusted entities. Consequently,it can be used as the corresponding stable logic feature generation model and algorithm for all kinds of images,and logic relationships among image features for trust roots. 展开更多
关键词 image trust root SCALE-SPACE diffusion equation evolution operator feature detection
在线阅读 下载PDF
Modeling Trusted Computing 被引量:3
2
作者 CHEN Shuyi WEN Yingyou ZHAO Hong 《Wuhan University Journal of Natural Sciences》 CAS 2006年第6期1507-1510,共4页
In this paper, a formal approach based on predicate logic is proposed for representing and reasoning of trusted computing models. Predicates are defined to represent the characteristics of the objects and the relation... In this paper, a formal approach based on predicate logic is proposed for representing and reasoning of trusted computing models. Predicates are defined to represent the characteristics of the objects and the relationship among these objects in a trusted system according to trusted computing specifications. Inference rules of trusted relation are given too. With the semantics proposed, some trusted computing models are formalized and verified, which shows that Predicate calculus logic provides a general and effective method for modeling and reasoning trusted computing systems. 展开更多
关键词 trusted computing group (TCG) trusted platform module (TPM) trusted computing root of trust predicate logic
在线阅读 下载PDF
Root-Of-Trust for Continuous Integration and Continuous Deployment Pipeline in Cloud Computing
3
作者 Abdul Saboor Mohd Fadzil Hassan +4 位作者 Rehan Akbar Erwin Susanto Syed Nasir Mehmood Shah Muhammad Aadil Siddiqui Saeed Ahmed Magsi 《Computers, Materials & Continua》 SCIE EI 2022年第11期2223-2239,共17页
Cloud computing has gained significant use over the last decade due to its several benefits,including cost savings associated with setup,deployments,delivery,physical resource sharing across virtual machines,and avail... Cloud computing has gained significant use over the last decade due to its several benefits,including cost savings associated with setup,deployments,delivery,physical resource sharing across virtual machines,and availability of on-demand cloud services.However,in addition to usual threats in almost every computing environment,cloud computing has also introduced a set of new threats as consumers share physical resources due to the physical co-location paradigm.Furthermore,since there are a growing number of attacks directed at cloud environments(including dictionary attacks,replay code attacks,denial of service attacks,rootkit attacks,code injection attacks,etc.),customers require additional assurances before adopting cloud services.Moreover,the continuous integration and continuous deployment of the code fragments have made cloud services more prone to security breaches.In this study,the model based on the root of trust for continuous integration and continuous deployment is proposed,instead of only relying on a single signon authentication method that typically uses only id and password.The underlying study opted hardware security module by utilizing the Trusted Platform Module(TPM),which is commonly available as a cryptoprocessor on the motherboards of the personal computers and data center servers.The preliminary proof of concept demonstrated that the TPM features can be utilized through RESTful services to establish the root of trust for continuous integration and continuous deployment pipeline and can additionally be integrated as a secure microservice feature in the cloud computing environment. 展开更多
关键词 root of Trust(RoT) trusted Platform Module(TPM) cryptoprocessor microservices Hardware Security Modules(HSM) DevOps
在线阅读 下载PDF
vCerberus:A DRTM System Based on Virtualization Technology
4
作者 CHEN Wenzhi ZHANG Zhipeng YANG Jianhua HE Qinming 《Wuhan University Journal of Natural Sciences》 CAS 2010年第3期185-189,共5页
This paper presents vCerberus, a novel hypervisor to provide trusted and isolated code execution within virtual domains vCerberus is considerably tiny, while allowing secure sensitive codes to be executed in an isolat... This paper presents vCerberus, a novel hypervisor to provide trusted and isolated code execution within virtual domains vCerberus is considerably tiny, while allowing secure sensitive codes to be executed in an isolated circumstance from the virtual ddmain, and can be attested by a remote party in an efficient way. These properties will be guaranteed even if the vip operating system is malicious. This protects the secure sensitive codes against the malicious codes in the vip OS, e.g., the kernel rootkits. We present an approach to dynamically measure and isolate the launch environment on the virtual machines based on the para-virtualization technology and a novel virtualization of trusted platform module (TPM). Our performance experiment result shows that the overhead introduced by vCerberus is minimized; the performance of the launch environment in vCerberus is as competitive as the vip OS running on mainstream hypervisors. 展开更多
关键词 trusted computing para-virtualization dynamic root of trust for measurement (DRTM) trusted platform module (TPM)
原文传递
保护物联网免受黑客攻击的基础
5
作者 郭正伟 《中国集成电路》 2021年第11期18-23,30,共7页
随着连接到物联网(IoT)的设备数量不断增加,对这些设备的强大安全解决方案的需求持续增加。物联网的安全性绝不应是事后考虑,原因在于产品被破坏会导致高达数千万美元的巨额损失和责任索赔。您可以提前支付安全费用或稍后支付巨额赔偿金... 随着连接到物联网(IoT)的设备数量不断增加,对这些设备的强大安全解决方案的需求持续增加。物联网的安全性绝不应是事后考虑,原因在于产品被破坏会导致高达数千万美元的巨额损失和责任索赔。您可以提前支付安全费用或稍后支付巨额赔偿金,但这永远不会是免费的。本文主要内容:一是阐述了通过查看需要保护的互联设备的最基本资产来解决安全需求:保护数据和对网络上的设备彼此进行身份验证所需的密钥和标识。这些敏感资产是任何安全架构的核心,需要保护其免受攻击者的攻击,以确保设备安全。二是介绍了需要这些资产的场景,从芯片供应商和设备制造商的角度思考,并比较了保护这些重要资产的不同方法。三是除了介绍存储敏感信息的传统方法外,还额外介绍了一种基于物理不可克隆函数(PUF)的方法。它显示了PUF的性能如何优于传统方法,特别是在将物联网有效扩展到数十亿设备的背景下、并从芯片和设备制造商的角度进行了分析。 展开更多
关键词 信任根(root of Trust) PUF(Physical Unclonable Function) SRAMPUF 非易失性存储器(NVM) 根密钥 安全芯片(SE)
在线阅读 下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部