期刊文献+

基于网格环境的可信计算平台共享模型 被引量:5

A sharing model for trusted computing platform
下载PDF
导出
摘要 提出了一种基于网格环境的可信计算平台共享模型以提高可信与非可信节点混合环境下的整体安全性.模型允许非可信网格节点借用可信节点的可信平台模块及其核心服务以提高自身参与网络协同的可信程度,有助于提高当前网格环境中可信应用的范围.在模型中同时设计了远程协商协议、密钥迁移协议、验证和证明协议来解决共享过程中的交互问题.分析表明使用本模型可以平衡网格的安全性与代价,降低可信计算应用的门槛. A network environment based sharing model for trusted computing platform,a scheme called grid trusted sharing model(GTSM) was proposed to improve the holistic security in the environment mixture of trusted and untrusted platforms.In this model,untrusted grids could use the trusted grids of trusted platform module and its core services to improve untrusted grids′ participation and the trust of the coordination with the network.Three protocols,including remote agreement,key migration,verify and Attestation we...
出处 《华中科技大学学报(自然科学版)》 EI CAS CSCD 北大核心 2007年第12期5-8,共4页 Journal of Huazhong University of Science and Technology(Natural Science Edition)
基金 国家自然科学基金重大研究计划资助项目(904712010) 国家自然科学基金资助项目(60603065)
关键词 可信计算 共享模型 网格安全 可信平台模块 密钥迁移 trusted computing sharing model grid security infrastructure trusted platform model key migration
  • 相关文献

参考文献8

  • 1[1]Felten E W.Understanding trusted computing:will its benefits outweigh its drawbacks[J].IEEE Security and Privacy,2003,1(3):60-62.
  • 2[2]Dobson J,Randell B.Building reliable secure computing systems out of unreliable insecure components[C]∥Computer Security Applications Conference.New York:IEEE Computer Society,2001:164-173.
  • 3[3]The Globus Security Team.Globus toolkit version 4 grid security infrastructure:a standards perspective.Version 4[S/OL].[2005-09-12].http:∥globus.org/toolkit/docs/4.0/security/GT4-GSI-Overview.pdf
  • 4[4]Novotny J,Tuecke S,Welch V.An online credential repository for the grid:MyProxy[R/OL].[2001-08-01].http:∥www.globus.org/alliance/publications/papers/myproxy.pdf
  • 5[5]Latham D C.Department of defense trusted computer system evaluation criteria[S].New York:National Computer Security Center,1985.
  • 6[6]Shi E,Perrig A,Doorn L V.BIND:a fine-grained attestation service for secure distributed systems[C]∥Security and Privacy.New York:IEEE Press,2005:154-168.
  • 7[7]Mao Wenbo.Grid security with behavior conformity from trusted computing[C]∥Scalable Trusted Computing.New York:ACM Press,2006:43-46.
  • 8[8]The Trusted Computing Group.TCG infrastructure workgroup subject key attestation evidence extension specification version 1.0.revision 7.16[S/OL].[2005-06].https:∥www.trustedcomputinggroup.org/specs/IWG/IWG -SKAE-Extension-1-00.pdf

同被引文献23

  • 1林闯,彭雪海.可信网络研究[J].计算机学报,2005,28(5):751-758. 被引量:253
  • 2郑宇,何大可,梅其祥.支持可信计算的软件保护模型[J].西南交通大学学报,2006,41(1):63-67. 被引量:7
  • 3沈昌祥,张焕国,冯登国,曹珍富,黄继武.信息安全综述[J].中国科学(E辑),2007,37(2):129-150. 被引量:358
  • 4GUAN S Y,DONG X S,WU W G,et al.Trust management and service selection in pervasive computing environments[C] // Proceedings of International Conference on Computational Intelligence and Security Workshops.Washington,DC:IEEE,2007:620 -623.
  • 5TCG.TPM Specification Version 1.1[EB/OL].[2009-06-20].http://www.trustedcomputinggroup.org.
  • 6BRICKELL E,CAMENISCH J,CHEN L Q.Direct anonymous attestation[C] // Proceedings of ACM Conference on Computer and Communications Security.New York:ACM,2004:132 -145.
  • 7TCG.TCG Specification Architecture Overview.Vereionl.4[EB/OL].[2009-08-02].http://www.trustedcomputinggroup.org/.
  • 8BRIZEK J,KHAN M,SEIFERT J P,et al.A platform-level trust architecture for hand-held devices[C] // Proceedings of 2005 Workshop on Cryptographic Advances in Secure Hardware.New York:ACM,2005.
  • 9EISENBARTH T,G(U)EYSU T,PAAR C,et al.Reconfigurable trusted computing in hardware[C] // Proceedings of the 2007 ACM workshop on Scalable trusted computing.New York:ACM,2007:15-20.
  • 10DIETRICH K.An integrated architecture for trusted computing for Java enabled embedded devices[C] // Proceedings of the 2007 ACM Workshop on Scalable Trusted Computing.New York:ACM,2007:2-6.

引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部