期刊文献+

一种可信软件栈的兼容性改进方案 被引量:5

Improvement about the Compatibility of TCG Software Stack
原文传递
导出
摘要 针对目前可信软件栈(TSS)规范的应用兼容性问题,提出了TSS命令改进方案,使之能够支持多种密码算法的可信平台模块.通过对TSS体系结构和组成的分析,重点描述了可信服务提供层(TSP)和可信核心服务层(TCS)的功能和接口特点,并以典型的可信平台模块(TPM)命令为例,通过句柄映射和函数输入输出参数的调整,增加TCS命令解释功能,改进TSS兼容性,使得TSS在不修改上层应用的情况下能兼容多种密码方案,达到应用兼容的目标. In order to address the capability problem of TCG software stack(TSS),an improved scheme of TSS was proposed that can support not only trusted platform module(TPM) but also modules based on other cryptographs.The analysis on the architecture and composing of TSS,emphasized on describing of the functions and interfaces of TSS service provider layer(TSP) and TSS core services layer(TCS).By modifying some commands of trusted platform module(TPM),such as with handle mapping,changing the input and output parameters of about the function,adding the interpretation function of TCS,the compatibility of the TCG software stack was improved.
作者 刘毅 沈昌祥
出处 《武汉大学学报(理学版)》 CAS CSCD 北大核心 2009年第1期57-61,共5页 Journal of Wuhan University:Natural Science Edition
基金 国家重点基础研究发展规划(973)项目(2007CB311100) 国家高技术研究发展计划(863)项目(2006AA01Z440) 北京市科技计划(Z07000100720706)项目
关键词 可信平台模块 可信软件栈(TSS) 兼容性 trusted platform module TCG software stack(TSS) compatibility
  • 相关文献

参考文献11

  • 1Sean W S. Trusted Computing Platforms : Design and Applications[ M]. New York: Springer-Verlag, 2005.
  • 2Trusted Computing Group. TCG Specification Architecture Overview [EB/OL]. [2007-12-02]. https://www.trustedcomputinggroup.org/groups/TCG_1_4_Architecture_Overview. pdf.
  • 3Trusted Computing Group. TCG Software Stack Specification Version 1.2 Level Errata[EB/OL]. [2007 12- 03]. https://www. trustedcomputinggroup.org/ specs/TSS/TSS_1_2 Errata_Afinal.pdf.
  • 4国家密码管理局.可信计算密码支撑平台功能与接口规范[EB/OL].http://www.oscca.Gov.on/UpFile/File64.PDF,2008
  • 5Zhang Xing, Zhou Ming, Zhuang Junxi, et al. Implementation of ECC-Based Trusted Platform Module [C]//Machine Learning and Cybernetics, 2007 International Conference. Hong Kong:IEEE Computer Society,2007: 2168-2173.
  • 6张兴,张晓菲,刘毅,沈昌祥.一种新的授权数据管理方案[J].武汉大学学报(理学版),2007,53(5):518-522. 被引量:3
  • 7Zhang Xing, Zu Lu, Yu Sheng. Improvement upon Architecture of TCG Credentials[C/ OL]/ / Proceedings of the Seventh International Conference on Machine Learning and Cybernetics 2008. hap://www. ieeexplore. ieee. org/ iel5/4604641/4621032/04621043. pdf.
  • 8Trusted Computing Group. TCG PC Client Specific, Implementation Specification for Conventional BIOS[EB/OL].[2007-12-08 ]. https://www.trustedcomputinggroup, org/specs/ PCClient/ TCG_PCClientImplementation f orBIOS_1 - 20_1 - 00. pdf .
  • 9Danilo B, Lorenzo C, Andrea L. Replay Attack in TCG Specification and Solution[C]/ / Computer Security Applications Conference. Orlando: IEEE Press, 2005:11-21.
  • 10Mario S. A Software-Based TPM Emulator for Linux [EB/OL]. [2007-12-06]. http://www. infsec. ethz. ch/ people/ psevinc/TPMEmulatorTalk. pdf .

二级参考文献8

  • 1肖政,李景霞,刘小杰,陈军,侯紫峰.一种可信网络接入认证模型和改进的OSAP协议设计与研究[J].计算机科学,2006,33(11):56-60. 被引量:3
  • 2Trusted Computing Group. TCG Specification Architecture Overview[EB/OL]. [2006-08-08]. http:// www. trustedcomputinggroup.org/ groups/ TCG_1_2 Architecture_Overview. pdf .
  • 3Trusted Computing Group. TPM Specification Version 1.2. Part 1 Design Principles[EB/OL]. [2006-08-08]. http ://www. trustedcomputinggroup.org/specs/ TPM/Main_Part1_rev94. zip.
  • 4Trusted Computing Group. TPM Specification Version 1.2. Part 2 TPM Structures[EB/OL]. [2006-08-08]. https://www.trustedcomputinggroup.org/specs/ TPM/Main_Part2_rev94. zip.
  • 5Trusted Computing Group. TPM Specification Version 1.2. Part 3 TPM Commands[EB/OL]. [2006-08-08]. https://vovovo. trustedcomputinggroup.org/specs/ TPM/ Main_Pa rt3_rev94.zip.
  • 6Bruschi D,Cavallaro L,:anzi A,et al. Replay Attack in TCG Specification and Solution[EB/OL]. [2006-01- 09]. http//idea.sec. dico. unimi.it/~andrezv/archive/tcg-tcp-oiap.en. pdf.
  • 7Strasser M, Stamer H. TPM Emulator Projects [EB/ OL]. [2006-08-08]. http://developer.berlios.de/ projects/tpm-emulator/.
  • 8Catherman R, Munetoh S, Nakamura T. TrouSerS-An Open-Source TCG Software Stack Implementation [EB/OL ]. [2006-08-08 ]. http://sourceforge.net/ projects/trousers/.

共引文献10

同被引文献33

  • 1Trusted Computing Group. TCG Specification Architecture Overview[OL]. http://www.trustedcomputinggroup, org/files/resource _ files/AC65 2DE1-1D09-3519-ADA026AOC05CFAC2/TCG_1_4 _Architecture_Overview. pdf, 2007.
  • 2Trusted Computing Group. TPM Main Part 1 Design Principles Specification Version 1. 2.[OL]. http ://www. trustedcomputinggroup, org/re sources/tpm_ main_ specification/mainP1DPrev103. zip,2007.
  • 3Trusted Computing Group. TCG Software Stack Specification Version 1. 2 Level 1 Errata A [OL]. http://www, trustedcomputinggroup. org/files/resource_ files/6479CD77-1DO9-3519-AD89EADIBC 8C97F0/TSS 1 2 Errata_A-final. pdf,2007.
  • 4Bruschi D, Cavallaro L, Lanzi A, et al. Replay Attack in TCG Specification and Solution[C]. The 21st Annual Computer Security Applications Conference, Washington D C, USA, 2005.
  • 5Zhang Xing, Zhang Xiaofei, Shen Changxiang. A New Authorization Protocol for Trusted Computing [C]. The 1st International Symposium on Data, Privacy and E-Commerce, Oakland, CA,2007.
  • 6Zhang Xing, Zhou Ming, Zhuang Junxi, et al. Implementation of ECC-Based Trusted Platform Module[C]. Machine Learning and Cybernetics, Hong Kong, China, 2007.
  • 7Catherman R, Munetoh S, Nakamura T. TrouSerS-An Open-source TCG Software Stack Implementation[OL]. http://soureeforge, net/projects/trousers/, 2007.
  • 8Zaha J M, Geisenberger M, Groth M. Compatibility Test and Adapter Generation for Interfaces of Software Components [M]. Berlin; Springer-Verlag, 2004:318-328.
  • 9Zaremski A M, Wing J M. Signature Matching: A Key to Reuse[M]. New York: ACM Press, 1993: 182-190.
  • 10Trusted Computing Group. TPM specification version 1.2. Part 1 Design Prineiples Revision 103[EB/OL]. 2007:19-21. http:// www. trustedcomputinggroup, org/resourees/tpm_specification_version_12_revision_ 103 _part_ 1_3.

引证文献5

二级引证文献7

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部