期刊文献+

基于可信计算平台的静态客体可信验证系统的设计与实现 被引量:4

Design and Implementation of the Trusted Authentication System for the Static Object Based on the TPM
下载PDF
导出
摘要 在安全操作系统中,通常采用了多种访问控制模型来保证静态客体的内容的机密性和完整性。但是,传统的访问控制政策不能保证静态客体内容的真实性。因此,安全操作系统中的客体并不可信。本文首先分析了操作系统中客体的类型,总结了安全操作系统中对静态客体的处理存在的问题,提出可信静态客体的概念并分析其特点。为了保证可信静态客体内容的真实性,提出了基于TPM的静态客体可信验证系统。该系统将生成可信静态客体的映像文件,映像文件记录某可信静态客体的来源、各次处理行为和内容变化的签名并存于TPM中。最后对该可信验证系统进行了安全和性能分析。分析表明,该可信验证系统可以保证可信静态客体内容的真实性,为进一步建立可信计算环境提供了基础。 Generally, the security operating system makes use of the multi-mixed access control policies to guarantee the confidentiality and integrity of the static object, but the traditional access control policies still have some deficiencies in accessing the object, and can't guarantee the authenticity of the object. So the object in the security operating system isn't trustworthy. In this paper, the object types in the operating system, which are sorted into the static object and the dynamic object, are analyzed, and some problems for accessing the object in the security operating system are pointed out. Based on that, the conception of the trusted static object, the trusted dynamic object and the trusted object is put forward, and the characters of the trusted object, the relationship between the secure object and the trusted object are addressed. Finally, some requirements for the trusted object, which need to be resolve in the trusted operating system, are presented and discussed. All of these are the foundation for our future works.
作者 谭良 周明天
出处 《计算机科学》 CSCD 北大核心 2008年第2期253-255,300,共4页 Computer Science
基金 国家863宽带VPN项目863-104-03-01课题资助 2003年度四川省科技攻关项目03GG007-007支持
关键词 安全操作系统 客体 可信操作系统 可信静态客体 可信动态客体 可信客体 可信计算平台 Security operating system, Object, Trusted operating system, Trusted static object, Trusted dynamic object, Trusted object,TPM
  • 相关文献

参考文献20

  • 1Jajodia S, Sarnarati P, Subrahmanian V, et al. A unified framework for anforcing multiple access control policies. In: S IGMOD '97, Tucson, AZ, May 1997. 474-485.
  • 2Galiasso P, Bremen O, Hale J, et al. Policy Mediation for Multienterprise Environments. ACSAC,2000. 100-106.
  • 3Abrams M, LaPadula L, Eggers K, et al. A Generalized Framework for Access Control: an Informal Description. In: Proceedings of the 13th National Computer Security Conference, Gct. 1990. 134-143.
  • 4Bertino E, Jajodia S, Samarati P. Supporting Multiple Access Control Policies in Database Systems. In: IEEE Symposium on Security and Privacy, Oakland, 1996.
  • 5Osborn S, Sandhu R, Munawer Q. Configuring Role-based Access Control to Enforce Mandatory and Discretionary Access Control Policies. ACM Transactions on Information and System Security, 2000, 3(2).85-105.
  • 6Secure Computing Corporation. DTOS Lessons Learned Report: [Technical Report]. DTOS CDRL A008. Secure Computing Corporation, Secure Computing Corporation, 2675 Long Lake Road, Roseville, Minnesota, June 1997. 55113-2536.
  • 7Bell D E, La Padula L J. Secure Computer Systems: A Mathematical Model. MTR 2547-Ⅱ (AD 771 543). The MITRE Corporation, Bedford, Massachusetts, May 1973.
  • 8Harrison M H, Ruzzo W L, Unman J D. Protection in operating systems. Communications of the ACM, 1976, 19(8):461-471.
  • 9Biba K J. Integrity considerations for secure computer systems: [Technical Report]. MTR 3153. The Mitre Corporation, April 1977.
  • 10Denning D E. A lattice model of secure information flow. Commun ACM, 1976,19(5) .236-242.

二级参考文献68

  • 1林闯,任丰原.可控可信可扩展的新一代互联网[J].软件学报,2004,15(12):1815-1821. 被引量:79
  • 2.中国互联网发展状况统计[EB/OL].http://www.cnnic.net.cn,.
  • 3S Micali.Efficient Certificate Revocation[M].Cambridge,MA,USA:Massachusetts Institute of Technology,1996.542-563.
  • 4Paul C Kochar.On certificate revocation and validation[A].Proceedings of the Second International Conference on Financial Cryptography[C].Berlin:Springer-Verlag,1998.171-177.
  • 5Moni,Naor,Kobbi,Nissim.Certificate revocation and certificate update[J].IEEE Journal on Selected Areasin Communications,2000,18(1):561-170.
  • 6Hously R,Ford W,Polk W,et al.Internet X.509 publickey infrastructure certificate and CRL profile[S].IETF RFC2459,1999,http://www.ietf.org/rfc/rfc2459.html.
  • 7André (A)rnes,Mike Just,Svein J,et al.Selecting revocation solutions for PKI[A].Proceedings of The Fifth Nordic Workshop on Secure IT Systems (NORDSEC 2000)[C].Reykjavik,Iceland,2000.360-376.
  • 8Cooper A Cooper.A more efficient use of Delta-CRLs[A].The Proceedings of the 2000 IEEE Symposium on Security and Privacy[C].Berkeley,2000.190-202.
  • 9David A Cooper.A model of certificate revoction[A].The Proceedings of Fifteenth Annual Comperter Security Application Conference[C].Phoenix,1999.256-264.
  • 10Mundie C. Remarks on Trusted Computing Forum 2001,www. microsoft. com/presspass/exec/craig, Nov. 6, 2001

共引文献289

同被引文献34

引证文献4

二级引证文献16

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部