期刊文献+

嵌入式终端可信计算环境的关键技术 被引量:5

Key Technologies for Trusted Computing Environment on Embedded Terminal
下载PDF
导出
摘要 阐述了在嵌入式终端上构建可信计算环境相关的嵌入式可信引导、TPM的扩展和驱动设计、嵌入式可信软件栈和嵌入式可信安全组件等关键问题。嵌入式可信引导可结合BR,USBKey和TPM等技术,保证用户、终端和应用三者间的可信认证。给出的嵌入式终端可信计算环境的方案保证了嵌入式可信平台的可重用性,同时也使平台具有更高的安全性和实用性。 The paper discusses the key problems to build embedded trusted computing environment, such as embedded trusted boot process, the extension and driver design of TPM, embedded TSS and trusted security component. The embedded trusted boot process is able to ensure the trusted attestation among users, terminals and application by making a combination of BR, USBKey and TPM. The scheme is able to make embedded platform more secure, practical and reusable.
出处 《计算机工程》 CAS CSCD 北大核心 2008年第22期239-241,244,共4页 Computer Engineering
基金 国家“863”计划基金资助项目(2007AA01Z483)
关键词 嵌入式终端 可信引导 可信软件栈 可信安全组件 embedded terminal trusted boot trusted software stack trusted security component
  • 相关文献

参考文献6

  • 1沈昌祥,张焕国,冯登国,曹珍富,黄继武.信息安全综述[J].中国科学(E辑),2007,37(2):129-150. 被引量:359
  • 2Arbaugh W, Farber D, Smith J A. Secure and Reliable Bootstrap Architecture[C]//Proc. of IEEE Symposium on Security and Privacy. Los Alamitos, CA, USA: [s. n.], 1997: 65-71.
  • 3Sailer R, Zhang Xiaolan, Jaeger T. et al. Design and hnplementation of a TCG-based Integrity Measurement Architecture[C]//Proc. of the 13th Usenix Security Symposium. San Diego, CA, USA: [s. n.], 2004.
  • 4黄涛,沈昌祥.一种基于可信服务器的可信引导方案[J].武汉大学学报(理学版),2004,50(A01):12-14. 被引量:19
  • 5Eisenbarth W. Security Functions on COM Express Platforms Running Under Linux[EB/OL]. (2007-07-11). http://www.embedded-control-europe.com/c ece knowhow/53/BASjun07p07. pdf.
  • 6Trusted Computing Group. TCG Software Stack(TSS) Specification Version 1.2[S]. 2006-01-06.

二级参考文献12

共引文献372

同被引文献41

引证文献5

二级引证文献60

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部