期刊文献+

Windows环境下信任链传递及其性能分析 被引量:14

Transitive Trust and Performance Analysis in Windows Environment
下载PDF
导出
摘要 动态多路径信任链(DMPTC)是一个基于软件类型特点的系统可信验证和保证机制.DMPTC对静态的系统软件和动态的应用软件加以区分,并采用不同的方式和策略对软件的装载运行加以控制,使得计算平台只运行那些有可信来源的可执行代码,从而确保平台的可信和安全.DMPTC可以用来防范各种已知和未知的恶意代码,并可以用来加强对生产信息系统中应用软件的管理和控制.DMPTC可以克服传统的静态单路径信任传递在系统灵活性和实用性层面的缺陷,并且在系统性能方面进行了深入的考虑和深层的优化.系统性能分析和实际测试结果都表明,在Windows系统平台上实现的DMPTC对系统运行带来的性能损失小于1%. Dynamic multi-path trust chain (DMPTC) is a software type and character based mechanism to assure system trustworthiness. DMPTC differentiates static system software and dynamic application software and takes different ways and policies to control the loading and running of various executable codes. The goal of DMPTC is to build a trusted computing platform by making computing platform only load and run trustworthy executables. DMPTC can be used to: 1) resist malicious codes (including known and unknown virus) which are the most serious threats to information systems, so as to improve system continuity of operation; and 2) help to manage and control what applications can be executed in business systems, improve their cost-effectiveness and productivity efficiency. DMPTC mainly uses the hash value of executables to verify their authenticity and integrity which is always a time-exhausted process; However, DMPTC gives great consideration to the impact it causes to system performance. Based on the attributes of various executables and by taking advantage of Windows interior security mechanisms, DMPTC reduces the time cost of the executables verification process greatly. The testing of DMPTC implemented on Windows platform shows that the performance loss caused by DMPTC is lower than 1%, and it is this optimization result that ultimately assures the flexibility and utility of DMPTC.
出处 《计算机研究与发展》 EI CSCD 北大核心 2007年第11期1889-1895,共7页 Journal of Computer Research and Development
基金 国家"八六三"高技术研究发展计划基金项目(20060101Z4015)~~
关键词 可信计算 信任链传递 信息安全 安全性能 恶意代码防范 trusted computing transitive trust information security security performance maliciouscode resistance
  • 相关文献

参考文献12

  • 1沈昌祥.构建积极防御综合防范的防护体系[J].信息安全与通信保密,2004(5):18-19. 被引量:19
  • 2M M Williamson.Throttling viruses:Restricting propagation to defeat mobile malicious code[C].The 18th Annual Computer Security Applications Conf,Las Vegas,2002
  • 3T Garfinkel,M Rosenblum,D Boneh.Flexible OS support and applications for trusted computing[C].The 9th Hot Topics in Operating Systems (HOTOS-Ⅸ),Hawaii,2003
  • 4William A Arbaugh,David J Farber,Jonathan M Smith.A secure and reliable bootstrap architecture[C].IEEE Computer Society Conf on Security and Privacy,Oakland,1997
  • 5Reiner Sailer,Xiaolan Zhang,Trent Jaeger,et al.Design and implementation of a TCG-based integrity measurement architecture[C].The 13th Usenix Security Symposium,San Diego,2004
  • 6Hiroshi Maruyama,Taiga Nakamura,Seiji Munetoh,et al.Linux with TCPA integrity measurement[R].IBM,Tech Rep:RT0575,2003
  • 7黄涛,沈昌祥.一种基于可信服务器的可信引导方案[J].武汉大学学报(理学版),2004,50(A01):12-14. 被引量:19
  • 8田俊峰,肖冰,马晓雪,王子贤.TDDSS中可信模型及其分析[J].计算机研究与发展,2007,44(4):598-605. 被引量:4
  • 9TCG.TCG Specification Architecture Overview,Version1.2[OL].Https://www.Trustedcomputinggroup.org,2004-04-28
  • 10TCG.TCG PC Specification Implementation Specification,Version 1.1[OL].https://www.trustedcomputinggroup.org,2003-08-18

二级参考文献11

共引文献36

同被引文献147

引证文献14

二级引证文献55

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部