期刊文献+

基于可信计算平台的自动信任协商

Automated trust negotiation based on trusted computing platform
下载PDF
导出
摘要 可信计算平台的应用保证了终端的可信性,为网络安全问题的解决和可信网络的构建提供了必要的安全支持。网络安全的首要问题是信任关系的建立,自动信任协商是解决该问题的一种有效的方法。在介绍了可信计算平台的基本组成、自动信任协商的概念之后给出了一种基于可信计算平台的信任协商模型,阐述了可信计算平台为信任协商提供的安全支持并探讨了自动信任协商中的若干关键问题。最后,给出了一个基于可信计算平台的信任协商的示例。 The application of the TCP in the network will make the terminals creditable, and it can provide effective supports for solving the network security problems. But other techniques are also needed to solve all the problems thoroughly. The trust relationship is the first element of the network security. And the automated trust negotiation (ATN) is an effective approach to establish trust relationships automatically. With the new functions provided by the TCP, the ATN will be securer. After introducing the basic components of the TPM and the concept of the ATN, an ATN model based on the TPM is presented. The access control policy and negotiation strategy are also discussed. In the end, the model is illustrated with an example.
出处 《计算机工程与设计》 CSCD 北大核心 2007年第14期3321-3323,3327,共4页 Computer Engineering and Design
基金 国家863高技术研究发展计划基金项目
关键词 可信计算 可信计算组织 可信平台模块 信任关系 自动信任协商 可信网络 trusted computing TCG TPM trust relationship automated trust negotiation trusted network
  • 相关文献

参考文献11

  • 1林利,蔡明杰.可信计算的研究及存在的问题[J].电脑与信息技术,2005,13(3):44-47. 被引量:2
  • 2宁宇鹏,曹元大.开放网络环境中信任的自动建立[J].计算机工程,2004,30(16):124-125. 被引量:5
  • 3TCG.trusted platform module protection profile[EB/OL].http://www.trustedcomputinggroup.org/home.
  • 4TCG.TCG main specification version 1.1b[EB/OL].http://www.trustedcomputinggroup.org/home.
  • 5TCG.TPMv1.2 specification changes[EB/OL].http://www.trustedcomputinggroup.org/home.
  • 6TCG.TPM design principles v1.2[EB/OL].http://www.trustedcomputinggroup.org/home.
  • 7侯方勇,周进,王志英,刘真,刘芸.可信计算研究[J].计算机应用研究,2004,21(12):1-4. 被引量:28
  • 8Winsborough W H,Seamons K E,Jones V E.Automated trust negotiation[C].DARPA Information Survivability Conference,Volume Ⅰ.Hilton Head,SC:IEEE Press,2000.88-102.
  • 9Winsborough W H,Li N.Safety in automated trust negotiation[C].Proceedings of the IEEE Symposium on Security and Privacy.Berkeley,California:IEEE Computer Society Press,2004:147-160.
  • 10谭兴烈.可信计算平台中的关键部件TPM[J].信息安全与通信保密,2005,27(2):29-31. 被引量:15

二级参考文献32

  • 1TCG.TPM Design Principles V 1.2[EB/OL].www.trustedcomputinggroup.org/home,2004—06—30.
  • 2TCG.TCG Main Specification Version 1.Ib[EB/OL].www.trustedcomputinggroup.orglhome.2004—06—30.
  • 3H.Krawczyk.M.Bellare.R.Canetti.RFC 2104[EB/OL].http://rfc.ner/rfc2104.html,2004—06—30.
  • 4Dunn J.The Concept of Trust in the Politics of John Locke. In:Philosophy in History,Cambridge University Press, 1984
  • 5Jsang A. The Right Type of Trust for Distributed Systems. New Security Paradigms ′96 Workshop, 1996
  • 6Cao Yuanda, Ning Yupeng. A Model of Trust Management in Open Network Environment. Journal of Beijing Institute of Technology,2003,12(3)
  • 7Intemational Telecommunication DUnion. Recommendation X.509-Information Technology Open Systems Interconnection-The Directory:Authentication Framework. 1997-08
  • 8Microsoft. NGSCB: Trusted Computing Base and Software Authentication [EB/OL]. http://www.microsoft.com/resources/ngscb/documents/ngscb_tcb.doc, 2003.
  • 9Birgit Pfitzmann, et al. PERSEUS [EB/OL]. http://www.perseu-sos.org/, 2003.
  • 10Microsoft. Microsoft Next-Generation Secure Computing Base-Technical FAQ [EB/OL]. http://www.microsoft.com/technet/security/news/ngscb.asp,2003.

共引文献49

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部