To build a trusted platform based on Trusted Computing Platform Alliance(TCPA)'s recommendation,we analyze the integrity mechanism for such a PC platfoim in this paper.By combinning access control model with infor...To build a trusted platform based on Trusted Computing Platform Alliance(TCPA)'s recommendation,we analyze the integrity mechanism for such a PC platfoim in this paper.By combinning access control model with information flow model,we put forwarda combinedprocess-based lattice model to enforce security This moelel creates a trust chain by which we canmanage a series of processes from a core root of trust module to some other application modules Inthe model,once the trust chain is created andmanaged cor-rectly,the integrity of the computer'shardware and sofware has bctn maintained,so does the confidentiality and authenticity.Moreover,arelevant implementation of the model is explained.展开更多
基金Supported by the National Natural Science Foun dation of China(90104005)the National High Technology Re search and Development Program of China(863 Program)(2002AA141051)
文摘To build a trusted platform based on Trusted Computing Platform Alliance(TCPA)'s recommendation,we analyze the integrity mechanism for such a PC platfoim in this paper.By combinning access control model with information flow model,we put forwarda combinedprocess-based lattice model to enforce security This moelel creates a trust chain by which we canmanage a series of processes from a core root of trust module to some other application modules Inthe model,once the trust chain is created andmanaged cor-rectly,the integrity of the computer'shardware and sofware has bctn maintained,so does the confidentiality and authenticity.Moreover,arelevant implementation of the model is explained.