期刊文献+

分布式系统中计算安全问题的一种解决方案 被引量:2

A Solution for Security Problem in Distributed Computing Systems
下载PDF
导出
摘要 分布式计算系统安全问题分为两大类:分布式计算的安全和主机的安全。其中恶意主机问题较难解决,该文通过对恶意主机问题的形式化分析,提出了一种基于可信域的终端模型(TrustDomainBasedTerminalModel,TDBTM)。该模型通过分布式应用参与制定本地访问控制决策来解决分布式系统对信息的机密性和完整性要求。同时提出了基于该模型以及可信计算思想设计的体系结构(TrustDomaiBasedTerminalArchitecture,TDBTA),以满足远程证实终端系统可信的需要。结合上述两点内容,该方案有望从根本上解决分布式计算系统中恶意主机带来的安全问题。 There are two classes of security problems in distributed computing system, security of hosts and security of distributed applications. This paper analyzes the problem of malicious hosts with formalized method, and proposes a trust domain based terminal model (TDBTM). The model which has distributed applications participate in establishing local system's access control policies should solve the requirement for guaranteeing integrity and confidentiality of distributed applications. Also, it proposes a trust domain based terminal architecture (TDBTA) to meet the remote attestation of terminal systems. With these two propositions, this solution can deracinate the malicious host problem fundamentally.
出处 《计算机工程》 EI CAS CSCD 北大核心 2006年第17期194-196,199,共4页 Computer Engineering
基金 国家"863"计划基金资助项目(2002AA1Z2101)
关键词 分布式计算 TCG TPM 可信计算 恶意主机 Distributed computing systems TCG TPM Trust computing Malicious host
  • 相关文献

参考文献6

  • 1Blaze M,Feigenbaum J,Lacy J.Decentralized Trust Management[C].Proceedings of IEEE Symposium on Security and Privacy,1996-05:164-173.
  • 2TCG Specification Architecture Overview(Version1.2)[Z].https://www.trustedcomputinggroup.org
  • 3Security and the Java Platform[Z].http://java.sun.com/security/.
  • 4Necula G,Lee P.Safe Untrusted Agents Using Proof-carrying Code[M].LNCS 1419.Berlin:Springer-Verlag,1988.
  • 5Yee B S.A Sanctuary for Mobile Agents[C].DARPA Workshop on Foundations for Secure Mobile Code,1997-02.
  • 6Reid J F,Nieto G,Juan M,et al.Privacy and Trusted Computing[C].Proceedings of the 14^th International Workshop on Database and Expert Systems Applications,Prague,Czech Republic,2003:383-388.

同被引文献11

  • 1刘淳,张凤元,张其善.基于智能卡的RSA与ECC算法的比较与实现[J].计算机工程与应用,2007,43(4):96-98. 被引量:10
  • 2Varadharajan V. Security enhanced mobile agents//Proc, of 7th ACM Conference on Computer and Communication Security. 2000
  • 3Borselius N. Mobile agent security. Electronics & Communication Engineering Journal, October 2002
  • 4沈志东.可信计算的关键技术与应用研究.学位论文.武汉大学,2006
  • 5Trusted Computing Group. TCG Specification Architecture Overview. Specification Revision 1. 4. http://www, trustedcomputinggroup, org. 2007. 8
  • 6Trusted Computing Group. TPM Main Part 2 TPM Structures. specification version 1.2. http://www, trustedcomputinggroup. org,2007,7
  • 7Wu Xiaoping, Shen Zhidong, Zhang Huanguo. The Mobile Agent Security Enhanced by Trusted Computing Teehnology//The 2^nd International Conference on Wireless Communications, Networking and Mobile Computing (WiCOM 2006). Wuhan: IEEE Press, 2006
  • 8王新成 袁子建.可信计算与系统安全芯片设计研究[J].国家信息安全测评认证,2005,5.
  • 9Lin Ching, Varadharajan V, Wang Yan, et al. Trust Enhanced Security for Mobile Agents//Proceedings of the Seventh IEEE International Conference on E-Commerce Technology (CEC'05). IEEE, 2005
  • 10The Aglets 2. 0. 2 User's Manual. http://www.trl. ibm.com/ aglets/, 2004,10

引证文献2

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部