期刊文献+

基于可信计算平台的可信动态客体监管系统的设计与实现 被引量:1

Design and Implementation of the Monitor System for the Trusted Dynamic Object Based on the TPM
下载PDF
导出
摘要 大部分安全操作系统在处理客体时,没有区分具体的客体类型,均采用统一的方法进标识,而且多数安全操作系统中采用传统访问控制方法保护的客体均是静态客体,忽略了对动态客体的保护,使得黑客或攻击者可以进行欺骗和中间人攻击,因此,安全操作系统中的动态客体并不可信。首先分析了操作系统中客体的类型,提出了可信动态客体的概念,并分析了其特点。为了防止动态客体泄露信息,提出了基于TPM的可信动态客体监管系统。一方面,该系统要求主体必须在TPM中注册,确保主体身份合法性,才能利用可信动态客体进行信息传递;另一方面,在TPM中必须存储创建该可信动态客体的属主的身份信息,以确保可信动态客体身份的合法性。最后进行了安全和性能分析,分析表明该可信动态客体监管系统可以阻止黑客利用动态客体进行欺骗和中间人攻击,防止信息泄露,为进一步建立可信计算环境提供了基础。 Most security operating system doesn't distinguish the sorts of the object, and labels them by the same method, moreover, the objects, which is protected by the traditional access control policies in most security operating system, are the static object, and ignore the dynamic object which can be utilized to cheat or man-in-the-middle attack by the hacker. So the dynamic object in the security operating system isn't trustworthy. The object types in the operating system, which are sorted into the static object and the dynamic object, are analyzed, and the conception of the trusted dynamic object is put forward. For prevent the dynamic object from leaking the information, the monitor system for the trusted dynamic object based on TPM (MSTEX2)BT) is presented. On the one hand, the MSTDOBT needs that the subject, who uses the trusted dynamic object to transfer the information, must register in TPM for authentication, on the other hand, the owner of the dynamic object must register in TPM for authentication too. Finally, we discuss the security of the MSTDOBT, it is shown that the MSTDOBT can prevent the dynamic object form being utilized to cheat or man-in-the-middle attack by hacker. All of these are the foundation forour future works.
作者 谭良 周明天
出处 《计算机科学》 CSCD 北大核心 2008年第1期281-284,F0003,共5页 Computer Science
基金 国家863宽带VPN项目863-104-03-01课题资助 2003年度四川省科技攻关项目03GG007-007支持
关键词 安全操作系统 客体 可信操作系统 可信动态客体 可信计算平台 Security operating system, Object, Trusted operating system, Trusted dynamic object, TPM
  • 相关文献

参考文献7

二级参考文献70

  • 1史训清,王志平,John HL Pang,张学仁,聂景旭.QUICK ASSESSMENT METHODOLOGY FOR RELIABILITY OF SOLDER JOINTS IN BALL GRID ARRAY (BGA) ASSEMBLY——PART Ⅰ: CREEP CONSTITUTIVE RELATION AND FATIGUE MODEL[J].Acta Mechanica Sinica,2002,18(3):274-287. 被引量:3
  • 2林闯,任丰原.可控可信可扩展的新一代互联网[J].软件学报,2004,15(12):1815-1821. 被引量:79
  • 3.中国互联网发展状况统计[EB/OL].http://www.cnnic.net.cn,.
  • 4S Micali.Efficient Certificate Revocation[M].Cambridge,MA,USA:Massachusetts Institute of Technology,1996.542-563.
  • 5Paul C Kochar.On certificate revocation and validation[A].Proceedings of the Second International Conference on Financial Cryptography[C].Berlin:Springer-Verlag,1998.171-177.
  • 6Moni,Naor,Kobbi,Nissim.Certificate revocation and certificate update[J].IEEE Journal on Selected Areasin Communications,2000,18(1):561-170.
  • 7Hously R,Ford W,Polk W,et al.Internet X.509 publickey infrastructure certificate and CRL profile[S].IETF RFC2459,1999,http://www.ietf.org/rfc/rfc2459.html.
  • 8André (A)rnes,Mike Just,Svein J,et al.Selecting revocation solutions for PKI[A].Proceedings of The Fifth Nordic Workshop on Secure IT Systems (NORDSEC 2000)[C].Reykjavik,Iceland,2000.360-376.
  • 9Cooper A Cooper.A more efficient use of Delta-CRLs[A].The Proceedings of the 2000 IEEE Symposium on Security and Privacy[C].Berkeley,2000.190-202.
  • 10David A Cooper.A model of certificate revoction[A].The Proceedings of Fifteenth Annual Comperter Security Application Conference[C].Phoenix,1999.256-264.

共引文献326

同被引文献3

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部