期刊文献+

基于服务端存储的可信计算模型 被引量:1

Trusted computing model based on server-end storage
原文传递
导出
摘要 为了充分利用服务端存储模式计算机的非本地存储特性,该文提出了一种适用于服务端存储的可信计算模型。该模型通过把原有的可信平台模块硬件逻辑化为服务端软件模块,不仅降低了可信计算模型实施的难度,而且提高了其灵活性和扩展性。同时该模型从客户端系统的引导阶段出发构建完整的可信链,保证了可信计算平台的安全性。原型系统实现的结果表明:由于系统中所有客户端的信任度量均在服务端完成,使服务端能制定针对局域网全网的安全策略,进而实现真正的局域网网络可信。 A trusted computing model was developed for the non-local-storage characteristics of the server-end storage computer architecture. The model achieves high flexibility and scalability by replacing the original trusted platform module (TPM) hardware with a software module implemented on the server. The model ensures the security of the computing platform by establishing a complete trust chain from the beginning of the boot stage of the client operating system. Implementation of a prototype system shows that since the server measures the trust of all clients, a security strategy can be formulated to implement real trustworthiness on the entire local area network.
出处 《清华大学学报(自然科学版)》 EI CAS CSCD 北大核心 2009年第7期1012-1014,1018,共4页 Journal of Tsinghua University(Science and Technology)
基金 国家自然科学基金资助项目(60673065)
关键词 安全性 可信计算 可信平台模块 信任传递 security trusted computing trusted platform module(TPM) transitive trust
  • 相关文献

参考文献10

  • 1Oracle, IBM, Sun, et al. Network computer reference profile [EB/OL]. (1996)[2008-11-24]. http: //www. sun. com/smi/press/sunflash/mncrs-profile.html.
  • 2Microsoft, Intel. Network PC system design guidelines[EB/OL]. (2001-12-4) [2008-11-24]. http: //www. microsoft.com/whdc/arehive/netpc.mspx.
  • 3Novell. NetWare 4 feature guide [EB/OL]. (1998)[2008-11-24]. http: //www. novell, corn/documentation/ lg/nw42/pdfdoc/newftenu, pdf.
  • 4Intel. Preboot execution environment (PXE) specification Vet2.1 [EB/OL]. (1999-9-20) [2008-11-24]. http //download. intel.com/design/archives/wfm/downloads/ pxespec, pdf.
  • 5张尧学,彭玉坤,周悦芝,方存好.可管理多媒体网络计算机(MMNC)[J].电子学报,2003,31(z1):2054-2058. 被引量:21
  • 6TCG. TCG Specification Architecture Overview. Verl. 4 [EB/OL]. (2007-8-2) [2008-11-24]. https://www. trustedcomputinggroup, org/groups/TCG_ 1- 4- Architecture-Overview, pdf.
  • 7Brizek J, Khan M, Seifert J P, et al. A platform-level trust-architecture for hand-held devices [C]//2005 Workshop on Cryptographic Advances in Secure Hardware (CRASH). Belgium, Z005.
  • 8Eisenbarth T, Guneysu T, Paar C, et al. Reeonfigurable trusted computing in hardware [C]//Proceedings of the 2007 ACM workshop on Scalable trusted computing. VA, USA, 2007: 15-20.
  • 9Dietrich K. An integrated architecture for trusted computing for Java enabled embedded devices [C]//Proceedings of the 2007 ACM workshop on Scalable trusted computing. VA, USA, 2007: 2-6.
  • 10TCG. TCG TNC(trusted network connect) architecture for Interoperability. Ver1.2[EB/OL]. (2007-5-2)[2008-11-24]. https : //www. trustedcomputinggroup. org/specs/TNC/TNC- Architecture_ v1_2_r4. pdf.

二级参考文献8

  • 1[1]M Revett, I Boyd, C Stephens. Network computing: a tutorial review[ J ]. Electronics & Communication Engineering Journal, 2001,13 ( 1 ): 5- 15.
  • 2[2]Apple,IBM,Netscape,Oracle,Sun. Network computer reference profile[ S/OL ]. http://www. sun. com/smi/Press/sunflash/mncrs-profile.html, 1996.
  • 3[3]Microsoft, Intel Corporation. Microsoft and Intel Launch NetPC with Industry Leaders [Z]. http://www. microsoft. com/presspass/press/1996/Oct96/NETPCpr. asp, 1996 - 10.
  • 4[4]http://www.novell.com/ [Z/OL].
  • 5[5]Wyse Technology Inc, Compaq Computer Corporation. Windows-Based Terminals, PCs, and NetPCs [ Z ]. http://www dpi. net. ir/PC/thinclients/articles/TechDocs/whitepaper. PDF, 1999 - 02.
  • 6[6]Wyse Technology Inc. Thin Clients, Windows-Based Terminal, NCs[Z ]. http://www. wyse. com/overview/white_ papers/whatdif. pdf,1998 - 03.
  • 7[8]R Rivest. RFC 1321,The MD5 Message-Digest Algorithm [S].April1992.
  • 8周悦芝,张尧学,王勇.一种用于网络计算的可定制启动协议[J].软件学报,2003,14(3):538-546. 被引量:12

共引文献20

同被引文献11

  • 1张焕国 何炎祥 赵波.我国可信计算研究与发展.中国计算机学会通讯,2010,6(2):8-18.
  • 2Singh M P,Huhns M N. Service-Oriented Computing : Seman-tics,Processes, Agents[M]. John Wiley Sons,Ltd,2005.
  • 3Papazoglou M P,Georgakopoulos D. Introduction to a SpecialIssue on Service-Oriented Computing[J]. Communications ofthe ACM,2003,46(10) :24-28.
  • 4Andrews T? Curbera F, Dholakia H, et al. Business ProcessExecution Language for Web Services (BPEL4WS),Version1. 1,[EB/OL]. [2003-05-05]. http://xml. Coverpages. Org/BPELvll-20030505-20030331-Diffs. pdf.
  • 5Trusted Computing Group. TCG Specification Architecture Over-view [EB/OL]. [2005-03-01]. https://www. trustedcomputing-group. org/.
  • 6Matt B.计算机安全学——安全的艺术与科学[M].北京:电子工业出版社,2005.
  • 7Sailer R,Zhang X,Jaeger T,et al. Design and Implementationof a TCG-Based Integrity Measurement Architecture [ C]//Proc of the 13rd USENIX Security Symposium, 2004:16.
  • 8Clark D D, Wilson D R. A Comparison of Commercial andMilitary Computer Security Policies[C]//Proc of the 1987IEEE Symp on Security and Privacy, 1987: 184-194.
  • 9OASIS. WS-Security[EB/()L]. [2006-02-01]. http://www.oasis-open, org/committees/download, php/16790/wss-vl. 1-spec-os-SOAPMessageSecurity. pdf.
  • 10OASIS. WS-Trust[EB/OL]. [2007-03-19]. http://docs, oa-sis-open. org/ws-sx/ws-trust/200512/ws-trust-l. 3-os. html.

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部