期刊文献+

可信计算中远程证明方法的研究 被引量:3

Research on Method of Remote Attestation in Trusted Computing
下载PDF
导出
摘要 可信计算是信息安全领域的研究热点,而远程证明方法又是可信计算研究中的难点和关键。远程证明就是发出证明请求的一方确认远程平台的身份和平台状态配置信息的过程。本文研究了远程证明的意义和方法,将抽象的远程证明模型分为四类,并分析了现在模型存在的问题和可以改进的方法,其实现思路对于提高可信计算中远程证明的效率提供了很好的参考价值。 Trusted computing is a hotspot in the field of information security,and remote attestation is the key of trusted computing. Remote attestation is a process of verifying the identity and configuration information of a remote platform by attestation requester. We research the meaning and method of remote attestation,divide the abstract models into four types and analyze the shortcoming of the existing models and the improved method in the paper. Its implementation takes a good reference for improving the effi...
出处 《微计算机信息》 北大核心 2008年第12期54-56,共3页 Control & Automation
基金 国家高技术研究发展计划"863"项目(20060101Z4015)
关键词 可信计算 远程证明 可信计算模块 可信第三方 trusted computing remote attestation trusted computing module trusted third party
  • 相关文献

参考文献6

  • 1王飞,刘毅.可信计算平台管理中心的设计与实现[J].微计算机信息,2007,23(3):91-93. 被引量:8
  • 2[3]T.C.Group.TCG software stack specification[EB/OL].http://www.trustedcomputinggroup.org,Aug.2003.Version 1.1.
  • 3[4]T.C.Group.TPM main specification[EB/OL].http://www.trustecomputinggroup.org,Nov.2003.Version 1.2.
  • 4[5]A.R.Sadeghi,C.Stüble.Property-based attestation for computing platforms:Caring about properties,not mechanisms[C].In The 2004 New Security Paradigms Workshop,Virginia Beach,VA,USA,Sept.2004.
  • 5[6]L.Chen,R.Landfermann,H.Loehr,M.Rohe,A.R.Sadeghi,C.Stüble.A protocol for property-based attestation[C].STC' 06,Alexandria,Viginia,USA.Nov.2006
  • 6[7]S.Yoshihama,T.Ebringer,M.Nakamura,S.Munetoh,H.Maruyama,WS-Attestation:Efficient and Fine-Grained Remote Attestation on Web Services[C].ICWS 2005,Orlando,Florida,USA.Jul.2005.

二级参考文献5

  • 1黄力.混合型防火墙的研究与设计[J].微计算机信息,2006,22(03X):34-36. 被引量:4
  • 2[1]TCG.Trusted Computing Group (TCG)Main Specification version 1.1a[EB/OL].http://www.trustedcomputinggroup.org/downloads/tcg spec 1.1b.zip,2001-09.
  • 3[2]Trusted Computing Group.TPM Main Specification:Design Principles v1.2[EB/OL].https://www.trustedcomputinggroup.org.Oct2003.
  • 4[5]Chen You-lei,Shen Chang-xiang.A Security Kernel Architecture Based Trusted Computing Platform[J].Wuhan University Journal of National Sciences.Vol.10,No.1,pages 1-4,Jan 2005.
  • 5沈昌祥.基于积极防御的安全保障框架[J].中国信息导报,2003(10):50-51. 被引量:22

共引文献7

同被引文献18

  • 1沈昌祥,张焕国,王怀民,王戟,赵波,严飞,余发江,张立强,徐明迪.可信计算的研究与发展[J].中国科学:信息科学,2010,40(2):139-166. 被引量:248
  • 2沈昌祥,张焕国,冯登国,曹珍富,黄继武.信息安全综述[J].中国科学(E辑),2007,37(2):129-150. 被引量:356
  • 3肖曦,韩军,汪伦伟.可信计算平台关键机制研究[J].信息工程大学学报,2007,8(2):217-220. 被引量:5
  • 4国家密码管理局.可信计算密码支撑平台功能与接口规范[EB/OL].http://www.oscca.gov.cn/,2007-12-29.
  • 5Trusted Computing Group. TCG Specification Architecture Overview Specification Revision 1.4 [EB/OL].http://www. trustedcomputinggroup, org/specs/TPM/TCG 1 4 Architecture D verview, pdf, 2007 8-2:5-21.
  • 6Trusted Computing Group. TPM Main Part 1 Design Principles Specification Version i. 2 Level 2 Revision 103[EB/OL]. http:// www. trustedcomputinggroup, org/ specs/ TPM/mainPiDPrevl03. pdf, 2007-7-9:12-28,55-59.
  • 7Trusted Computing Group. TCG Infrastructure Working Group Architecture Part II Integrity Management Specificatio:l Version '1.0 Revision 1. O[EB/OL]. http://www. trusted computinggroup.org/specs/IWG/IWG_ArchitecturePartII_v1.0, pdf, 2006-11-17.
  • 8Hu Ning, Zhu Peidong, Zou Peng. Reputation Mechanism for Inter-domain Routing Security Management[C]//Proc. of the 9th International Conference on Computer and Information Technology. [S. 1.]: IEEE Press, 2009: 98-103.
  • 9Josang A, Ismail R. The Beta Reputation System[C]//Proc. of the 15th Bled Electronic Commerce Conference. [S. 1.]: Bled Electronic Commerce Press, 2002: 1-14.
  • 10田立勤,林闯.可信网络中一种基于行为信任预测的博弈控制机制[J].计算机学报,2007,30(11):1930-1938. 被引量:70

引证文献3

二级引证文献7

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部