期刊文献+

基于标记变迁系统的可信计算平台信任链测试 被引量:19

Testing on Trust Chain of Trusted Computing Platform Based on Labeled Transition System
下载PDF
导出
摘要 可信计算是当今世界信息安全领域的重要潮流之一.根据国家有关规定,信息安全产品需要经过测评认证,但目前国内外对可信计算测试的理论与技术研究还非常不完善,也无相应测试工具或系统,这必然影响可信计算的发展.该文着眼于规范定义的信任链行为特征,以进程代数作为指称语义描述工具,以标记变迁系统作为操作语义,对规范定义的信任链行为特征进行了形式化描述,提出了一种基于标记变迁系统的信任链测试模型框架.针对信任链规范与实现之间的问题,从易测性出发对测试集进行了有效约简;并论证了信任链的规范实现与规范说明之间的关系,为测试用例构造方法提供了理论依据,从而解决了信任链测试这一难题. At present, the trusted computing has become a major development trend in the field of information security. According to "China National Information Security Certification and Evaluation Management", the information security products must be evaluated and certified. However, attribute to the situation that the specifications are established by the enterprises, the theory about the trusted computing is behind the technology, and there aren't any testing tools, which will affect the development of trusted computing. Therefore, this paper focuses on the behavior characters of specifications of trust chain, letting process algebra as denotation semantics, and taking labeled transition system (LTS) as operation semantics for formalizing behavior characters of trust chain. The authors put forward a test framework based on LTS for trust chain. Aiming at problems between specifications and implementations of trust chain, they reduce test suite effectively for testability, and reason the relationship of them, which are theory foundation of constructing test suite and solve the hard problem of trust chain test.
出处 《计算机学报》 EI CSCD 北大核心 2009年第4期635-645,共11页 Chinese Journal of Computers
基金 国家"八六三"高技术研究发展计划项目基金(2007AA01Z411 2008AA01Z404) 国家自然科学基金(60673071 90718005 90718006) 空天信息安全与可信计算教育部重点实验室开放基金资助~~
关键词 可信计算平台 信任链 进程代数 标记变迁系统 一致性测试 trusted computing platform trust chain process algebra labeled transition system conformance testing
  • 相关文献

参考文献17

  • 1沈昌祥,张焕国,冯登国,曹珍富,黄继武.信息安全综述[J].中国科学(E辑),2007,37(2):129-150. 被引量:358
  • 2张焕国,罗捷,金刚,朱智强,余发江,严飞.可信计算研究进展[J].武汉大学学报(理学版),2006,52(5):513-518. 被引量:114
  • 3Sailer R, Zhang Xiao-Lan, Jaeger T et al. Design and implementation of a TCG-Based integrity measurement architecture//Proceedings of the 13th Usenix Security Symposium. San Diego, California, 2004: 223-238
  • 4吴世忠.信息安全测评认证的十年求索[J].信息安全与通信保密,2007,29(6):5-8. 被引量:9
  • 5ISO/IEC 9646-1. Information technology open systems interconnection conformance testing methodology and framework- part 1: General concepts. 1994
  • 6蒋凡,宁华中.基于标号变迁系统的测试集自动生成[J].计算机研究与发展,2001,38(12):1435-1445. 被引量:6
  • 7赵瑞莲,闵应骅.一种基于规范和程序域分析的软件测试方法[J].计算机研究与发展,2003,40(6):846-855. 被引量:6
  • 8Keller R M. Formal verification of parallel programs. Communications of the ACM, 1976, 19(7): 371-384
  • 9Lien Y E. Study of theoretical and practical aspects of transition systems [Ph.D. dissertation]. University of California, Berkley, 1972
  • 10Plotkin G. A structural approach to operational semantics. Department of Computer Science Research Report DAIMI FN-19, Aaxhus University: Technical Report DAIMI FN- 19, 1981

二级参考文献85

共引文献535

同被引文献305

引证文献19

二级引证文献385

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部