期刊文献+

可信计算环境中的数字取证 被引量:9

Digital Forensics of Trusted Computing Environment
下载PDF
导出
摘要 为了进行可信计算环境中的数字取证调查,提出了一个可信计算取证模型.该模型对传统数字取证模型中的分析流程进行了扩展,增加了意识、授权和计划分析过程;在模型的收集和分析任务过程中引进了扩展的可信计算取证服务,包括:取证密封服务、取证密封数据、取证认证、密钥恢复以及分布式取证服务.利用可信计算取证服务和改进的分析流程能够有效解决可信计算环境中的数字取证调查问题.从可信计算和数字取证技术角度,分析了该模型的取证能力指标.通过比较和评价可知该模型具有较强的取证能力并能够进行分布式取证分析. This paper presents an extended trusted computing and forensics model in order to efficiently investigate the environment based on trusted computing technique. The workflow of traditional digital forensics model is improved: awareness, authorization and planning task are added. The extended trusted computing and forensic services are used in collecting and analysis activity, including forensic sealing, forensic authentication, key recovery and distributed forensic services. So the trusted computing environment can be investigated by extend forensic services and improved workflow. By the evaluation and comparison, the model has the ability to investigate trusted computing environment.
出处 《武汉大学学报(理学版)》 CAS CSCD 北大核心 2006年第5期523-526,共4页 Journal of Wuhan University:Natural Science Edition
基金 国家863计划资助项目(2003AA146010)
关键词 数字取证 可信计算 数据获取 加密 文件系统 digital forensics trusted computing data acquisition encryption file system
  • 相关文献

参考文献10

  • 1Trusted Computing Group. TCG Specification Architecture Overview [EB/OL]. [2006-04-28]. http://www. trustedcom putinggroup.org/ downloads/ TCG_1_0_Architecture_Overview.pdf.
  • 2余发江,张焕国.可信安全计算平台的一种实现[J].武汉大学学报(理学版),2004,50(1):69-73. 被引量:22
  • 3Mellars B. Forensic Examination of Mobile Phones[J]. Digital Investigation (Elsevier), 2004, 1 (1):266-272.
  • 4Carrier B, Spafford E. Categories of Digital Investigation Analysis Techniques Based on the Computer History Model [J]. Digital Investigation ( Elsevier),2006,3(2):121-130.
  • 5Palmer G. A Road Map for Digital Forensics Research, Report from the First Digital Forensics Research Workshop (DFRWS) [[R]. Washington: Air Force Research Laboratory, 2001.
  • 6Giordano J, Maciag C. Cyber Forensics: A Military Operations Perspective [J]. International Journal of Digital Evidence, 2002,1 (2) :72-84.
  • 7Reith M,Carr C, Bunch G. An Examination of Digital Forensic Models[J]. International Journal of Digital Evidence, 2002,1 (3):40-51.
  • 8Mason S. Trusted Computing and Forensic Investigations[J]. Digital Investigation (Elsevier), 2005, 2(2):189-192.
  • 9Carrier B. File Systems and Forensics Analysis[M].Boston: Addison-Wesley Professional, 2005.
  • 10李炳龙 王清贤 罗军勇 等.文档碎片分类模型及其关键问题[J].哈尔滨工业大学学报,2006,38:834-834.

二级参考文献1

  • 1北京中科红旗软件技术有限公司.红旗Linux/Red F1ag Software Co.,Ltd.RedF1ag-Linux[EB/OL].http://www.redf1ag-1inux.com/phrumredf1ag/index.php,2003-10-12(Ch).

共引文献24

同被引文献54

引证文献9

二级引证文献60

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部