期刊文献+

UCard的可信计算基研究 被引量:2

Research on the Trusted Computing Base of UCard
下载PDF
导出
摘要 本文首先介绍了一种为解决智能卡便携性问题而提出的新型智能卡结构模型-UCard;然后给出了UCard的可信计算基的具体构成;接着从UCard的两种工作形态即发卡态和用卡态详细分析了UCard在不同状态下其可信计算基的构成情况;最后,在讨论重构系统安全性问题的基础上,对多可信计算基的UCard安全性问题做了具体分析。 In this paper,the model of UCard (Universal Smart Card),which is a new type of smart card designed to improve the portability of conventional smart cards,is described first.Then the components of the trusted computing base of UCard are presented.Meanwhile,according to UCard’s two working states of issuing and using,the components of its trusted computing base in different states are analyzed in detail.Finally,the security of a reconfigurable system is discussed and on the basis of that the security of UCard with a multi-trusted computing base is analyzed.
出处 《计算机工程与科学》 CSCD 2007年第2期135-138,共4页 Computer Engineering & Science
关键词 智能卡 UCARD 一卡多发 可信计算基 重构 smart card,UCard,multi-issue card,TCB,reconfiguration
  • 相关文献

参考文献5

  • 1黄海鹰,常青,卢焕章.可重构计算技术[J].电子技术应用,1998,24(5):4-6. 被引量:6
  • 2Anderson J P.Computer Security Technology Planning Study.Vol Ⅱ[R].Technical Report ESD-TR-73-51,Air Force Systems Command,1972.
  • 3Nibaldi G H.Specification of a Trusted Computing Base[M].Bedford,MA:The MITER Corporation,1979.
  • 4America Department of Defense.Trusted Computer System Evaluation Criteria[R].Technical Report CSC-STD-001-83,1983.
  • 5Abrams M D,Joyce M V.Trusted Computing Update[J].Computer & Security,1995,14 (1):57-68.

二级参考文献2

  • 1Jean E.Vuillemin,Patrice Bertin,Didier Roncin.Mark Shand,Herve H Touati and Philippe Boucard,"Programmable Active Memories Reconfigurable Systems Come of Age",IEEE TRANSACTION ON VLSI SYSTEMS,VOL,4 NO,1 MARCH 1996,P56-69.
  • 2Peter Athanas and Phett Hudson"Using Rapid Prototyping to Teach the Design of Complete Computing Solutions",Reconfigurable Computing Workshop Proceedings,July 10-12,1996,P47-53.

共引文献5

同被引文献14

  • 1曹计昌,张登宝.关于UCard安全性的研究[J].华中科技大学学报(自然科学版),2005,33(6):23-25. 被引量:2
  • 2曹计昌,冯国平.UCard中动态地址总线的安全稳定性[J].华中科技大学学报(自然科学版),2006,34(11):48-51. 被引量:1
  • 3孙玲芳,许金波,朱芸.基于SET的电子商务的安全协议的分析[J].商业研究,2007(2):210-213. 被引量:5
  • 4曹计昌,周宇杰.基于高地址约束和按需存储分配的UCard底层调度模块研究[J].计算机工程与科学,2007,29(6):121-123. 被引量:2
  • 5Chen Zhiqun. Java cardTM technology for smart cards:architecture and programmer's guide (the Java series)[M]. Englewod Cliffs, New Jersey: Prentice Hall, 2000.
  • 6Bakdi I. Towards a secure and practical multifunctional smart card[C]//Smart Card Research and Ad- vanced Applications. Berlin: Springer-Verlag, 2006: 16-31.
  • 7Girard P. Which security policy for multiapplication smart cards[C]//USENIX Workshop on Smartcard Technology. Chicago: USENIX Association, 1999: 21-28.
  • 8Sehellhorn G, Reif W, Schairer A, et al. Verification of a formal security model for multiapplicative smart eards[C]// Computer Security-ESORICS 2000. Berlin : Springer-Verlag, 2000 : 17-36.
  • 9Tual J P. MASSC: a generic architecture for multiapplication smart cards[J]. IEEE Micro, 1999, 19 (5) : 52-61.
  • 10Cao Jichang, Qiu Peng, Zhang Bin. Research on the implement method of dynamic address mapping in UCard[C] // International Conference on Computer, Communications and Control Technologies. Austin: Int Inst Informatics & Systemic, 2004: 333-337.

引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部