期刊文献+

A Separated Domain-Based Kernel Model for Trusted Computing

A Separated Domain-Based Kernel Model for Trusted Computing
下载PDF
导出
摘要 This paper fist gives an investigation on trusted computing on mainstream operation system (OS). Based on the observations, it is pointed out that Trusted Computing cannot be achieved due to the lack of separation mechanism of the components in mainstream OS. In order to provide a kind of separation mechanism, this paper proposes a separated domain-based kernel model (SDBKM), and this model is verified by non-interference theory. By monitoring and simplifying the trust dependence between domains, this model can solve problems in trust measurement such as deny of service (DoS) attack, Host security, and reduce the overhead of measurement. This paper fist gives an investigation on trusted computing on mainstream operation system (OS). Based on the observations, it is pointed out that Trusted Computing cannot be achieved due to the lack of separation mechanism of the components in mainstream OS. In order to provide a kind of separation mechanism, this paper proposes a separated domain-based kernel model (SDBKM), and this model is verified by non-interference theory. By monitoring and simplifying the trust dependence between domains, this model can solve problems in trust measurement such as deny of service (DoS) attack, Host security, and reduce the overhead of measurement.
出处 《Wuhan University Journal of Natural Sciences》 CAS 2006年第6期1424-1428,共5页 武汉大学学报(自然科学英文版)
基金 Supported bythe National Basic Research Programof China (G1999035801)
关键词 noninterference teory separation kernel trusted computing noninterference teory separation kernel trusted computing
  • 相关文献

参考文献9

  • 1Trusted Computing Group.TPM Main Specification Version 1 .2[].htt:// wwwtrustedcomput- inggrouporg.2006
  • 2Garfinkel T,Pfaff B,Chow J Terra.A Virtual Machine- Based Platformfor Trusted Computing[].Proceedings of theth ACMSymposiumon Operating Systems Principles.2003
  • 3Sailer R,Zhang Xiaolan,Jaeger T,et al.Design and Imple- mentation of a TCG-Based Integrity Measurement Architec- ture[].Proceedingof theth USENIX Security Sym- posium.2004
  • 4Reid J F,Caelli WJ.DRMtrusted computing and operating system architecture[].Proc of Australasian Information Security Workshop.2005
  • 5Nancy L. Kelem,and Richard J. Feiertag.A separation model for virtual machine monitors[].Research in Security and Privacy.1991
  • 6Rushby J.Proof of Separability:A Verification Technique for a Class of Security Kernels[].Procof International Symposium on Programming.1982
  • 7Rushby,J. Safe and Secure Computing Systems . 1989
  • 8Rushby,J. Noninterference, Transitivity, and Channel-Control Security Policies . 1992
  • 9Grace,H N. Proposed Technical Evaluation Criteria for Trusted Computer Systems . 1979

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部