期刊文献+
共找到2篇文章
< 1 >
每页显示 20 50 100
可信密码模块软件栈兼容方案设计 被引量:4
1
作者 张兴 黄宁玉 祝璐 《武汉大学学报(信息科学版)》 EI CSCD 北大核心 2010年第5期618-621,共4页
提出了可信密码模块软件栈的兼容性设计方案,采用软件工程中的策略模式,在软件栈TSS基础上内置兼容解释器,对应用和TCM的交互进行数据流解析以及数据结构和授权协议的转换,为上层应用提供统一的服务接口。该方案使得基于TPM开发的可信... 提出了可信密码模块软件栈的兼容性设计方案,采用软件工程中的策略模式,在软件栈TSS基础上内置兼容解释器,对应用和TCM的交互进行数据流解析以及数据结构和授权协议的转换,为上层应用提供统一的服务接口。该方案使得基于TPM开发的可信应用不需修改或只需少量修改就可以应用于TCM。测试表明,可信密码模块软件栈完成了应用层调用可信功能的透明转换,实现了应用兼容。 展开更多
关键词 可信平台模块 可信密码模块 兼容性 软件栈 策略模式
原文传递
DPTSV:A Dynamic Priority Task Scheduling Strategy for TSS Deadlock Based on Value Evaluation 被引量:2
2
作者 ZHAO Bo XIANG Shuang +1 位作者 AN Yang TAO Wei 《China Communications》 SCIE CSCD 2016年第1期161-175,共15页
This paper analyzes the threat of TCG Software Stack(TSS)/TCM Service Module(TSM) deadlock in multi-user environment such as cloud and discusses its causes and mechanism.In addition,this paper puts forward a dynamic p... This paper analyzes the threat of TCG Software Stack(TSS)/TCM Service Module(TSM) deadlock in multi-user environment such as cloud and discusses its causes and mechanism.In addition,this paper puts forward a dynamic priority task scheduling strategy based on value evaluation to handle this threat.The strategy is based on the implementation features of trusted hardware and establishes a multi-level ready queue.In this strategy,an algorithm for real-time value computing is also designed,and it can adjust the production curves of the real time value by setting parameters in different environment,thus enhancing its adaptability,which is followed by scheduling and algorithm description.This paper also implements the algorithm and carries out its performance optimization.Due to the experiment result from Intel NUC,it is shown that TSS based on advanced DPTSV is able to solve the problem of deadlock with no negative influence on performance and security in multi-user environment. 展开更多
关键词 TCG software stack/tcm service module deadlock multi-user trusted platform module real-time value
在线阅读 下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部