期刊文献+

一种基于USBKey的可信测量根安全增强设计方案 被引量:3

A Scheme of Strengthening the Security of the root of trust for measurement based on USBKey
原文传递
导出
摘要 BIOS作为可信计算平台的测量根是可信链的源头,其安全性尤为重要。论文提出了一种基于USBKey的、功能可扩展的安全控制模块增强BIOS安全的设计方案,实现了底层的开机身份认证和安全控制功能,经分析证明此方案可有效地减少可信测量根的不安全因素。 The extended functions ofEFI BIOS take insecurities at the bottom for the computer. As the root of trust for measurement in the chain of trusted, the security of BIOS is very important. Based on USBKey, this paper proposes a design of extensible capability security control model that implements authentication and security controlling at the computer starting. This design has been proved having the ability of reducing the insecurities in the root of trust for measurement.
出处 《信息安全与通信保密》 2007年第12期114-117,共4页 Information Security and Communications Privacy
关键词 可信计算 EFI BIOS 测量根 安全控制模块 USBKEY trusted computing EFI BIOS root of trust for mesurement security control mode USBKey
  • 相关文献

参考文献7

二级参考文献14

共引文献380

同被引文献21

  • 1周伟东,池亚平,方勇,吴丽军.一种基于信任根加强EFI BIOS自身安全的方案[J].信息安全与通信保密,2007,29(7):87-88. 被引量:7
  • 2Intel Corporation.Extensible Firmware Interface Specification Version 1.10.http://developer.intel.com/technology/efi/,2002.12
  • 3UEFI,Unified Extensible Firmware Interface Specification version 2.10[S],USA:Intel,January 23,2007
  • 4Intel. EFI 1.10 Driver Writer's Guide Draft for Review[ S] Version 0.9 July 20, 2004,34 -35
  • 5William Stallings,刘玉珍译.密码编码学与网络安全----原理与实践[M]第三版.北京:电子工业出版社,2005.243-244.
  • 6Steve Burnett著,冯登国,等译.密码工程实践指南.北京:清华大学出版社,2001—10.241—259.
  • 7Hongjiao Li,Xiuxia Tian sesearch of Trust Chain of Operating System. Springer Verlag Berlin Heidelberg, 2009.
  • 8XU Min, JIANG Xu xian, SANDHU P,, et al. Towards a VMM based usage control framework for OS kernel integrity protection[C]//Proc the 12th ACM Symposium on Access Control Morde]s and Technology. New York: ACM Press, 2007, 71 -80.
  • 9CATUOGNO L, DMITEIENKO A, EPJKSSON K, et al.Trusted virtual dora&ins: design, implement&tion &rid lessons learned[C]//Proc of International Conference on Trusted Systems. [S. 1.]: Springer, 2010: 156- 179.
  • 10Peter A Pendergrass, LOBCOCCO, Perry C.Durward McDone W.W Linux Measurement Using Contextual Inspection[C] son, J.Aaron Kernel Integrity Proceedings of the 2007 ACM workshop on Scalable trusted computing Alexandria, Virginia, USA. 21-29.

引证文献3

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部