期刊文献+

基于TPM的UCON模型的构建

Construction of UCON Model based on TPM
下载PDF
导出
摘要 作为下一代访问控制技术的使用控制(UCON)模型已经成为访问控制技术研究的热点。主要对UCON模型的安全性进行了分析,并将可信计算模块TPM引入UCON模型,构建了基于TPM的使用控制模型——TUCON模型。 UCON model has become a hot research as the next generation of access control technology. The paper analyzes security of UCON model and puts forward the TUCON model based on Trusted Computing Module (TPM) .
作者 李俊
机构地区 河北大学
出处 《电脑开发与应用》 2009年第9期66-68,共3页 Computer Development & Applications
关键词 TPM UCON TUCON模型 TPM, UCON, TUCON model
  • 相关文献

参考文献7

二级参考文献22

  • 1谭兴烈.可信计算平台中的关键部件TPM[J].信息安全与通信保密,2005,27(2):29-31. 被引量:15
  • 2冯娟娟,刘胜利,王磊.一种健壮的计算安全的分布式密钥分发方案[J].微计算机信息,2005,21(12X):60-61. 被引量:1
  • 3JAEGER T,TIDSWELL J E.Practical safety in flexible access control models[J].ACM Transactions on Information and Systems Security,2001,4(3):34-58.
  • 4KOCH M,MANCINI L V,PARISI-PRESICCE F.Decidability of safety in graph-based models for access control[J].ACM European Symposium on Research in Computer Security,2002,21(7):2502-2548.
  • 5LI N,TRIPUNITARA M V.Security analysis in role-based access control[J].ACM Symposium on Access Control Models and Techniques,2004,9(1):28-46.
  • 6ZHANG X,PARK J,PARISI-PRESICCE F,et al.A logical specification for usage control[J].ACM Symposium on Access Control Models and Technologies,2004,18(9):1-26.
  • 7ZHANG Xin-wen.Formal model and analysis of usage control[J].ACM Symposium on Access Control Models and Technologies,2006,5(1):122-153.
  • 8HARRISON M H,RUZZO W L,ULLMAN J D.Protection in operating systems[J].Communication of ACM,1976,19(8):28-57.
  • 9.http://www.trustedcomputinggroup.org.
  • 10David Lie,Chandramohan A Thekkath,Mark Horowitz.Implementing an untrusted operating system on trusted hardware[C].ACM SIGOPS Operating Systems Review,2003,37(5):178-192.

共引文献7

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部