期刊文献+

一种基于智能卡的可信监视器程序实现方法 被引量:1

Implementation Method of Trusted Monitor Program Based on Smart Card
下载PDF
导出
摘要 智能卡的安全机制存在篡改存储数据或代码、拒绝服务攻击、重新编程等安全问题,其根源在于卡的合法应用环境发生了改变、正常应用操作序列发生了错乱或模仿。针对上述问题,结合智能卡应用与可信计算技术,提出一种对智能卡计算环境可信和行为可信的验证方法。通过智能卡COS的开发实现该可信增强的技术。该方法可提高金融卡应用的可信度。 The security mechanism of smart card can not dissolve some problems such as tampering the data or code, DoS attacks and re-programming. These problems are mainly caused by destruction of the card's application circumstance, by confusion or simulation of the operating sequence. By combinating of trusted computing technology and application of smart card, a method to verify the trustiness of the circumstance and actions on the card is present. The implementation for the method is introduced by the development of a kind of chip operating system on smart card, from which the trustworthiness of the financial card is enhanced effectively.
作者 涂国庆
出处 《计算机工程》 CAS CSCD 北大核心 2009年第18期22-24,共3页 Computer Engineering
基金 国家"863"计划基金资助项目(2006AA01Z442 2007AA01Z411)
关键词 可信计算 信任链 智能卡 监视器 trusted computing trust chain smart card monitor
  • 相关文献

参考文献5

  • 1Koopman P. Embedded System Security[J]. Embedded Computing, 2004, 37(7): 95-97.
  • 2David D H, Schaumont P. Securing Embedded Systems[J]. IEEE Security & Privacy Magazine, 2006, (4)3: 40-49.
  • 3Mao Shufu, Wolf T. Hardware Support for Secure Processing in Embedded Systems[C]//Proceedings of DAC'07. San Diego, California, USA: [s. n.], 2007.
  • 4张焕国,罗捷,金刚,朱智强,余发江,严飞.可信计算研究进展[J].武汉大学学报(理学版),2006,52(5):513-518. 被引量:114
  • 5TCG Main Specification Version 1.2.2[Z]. (2003-10-10). https:// www. trustedcomputinggroup.org.

二级参考文献19

  • 1张焕国,毋国庆,覃中平,刘玉珍,刘毅,彭涛,韩永桥.一种新型安全计算机[J].武汉大学学报(理学版),2004,50(A01):1-6. 被引量:21
  • 2张焕国,刘玉珍,余发江,周强,叶新.一种新型嵌入式安全模块[J].武汉大学学报(理学版),2004,50(A01):7-11. 被引量:7
  • 3林闯,彭雪海.可信网络研究[J].计算机学报,2005,28(5):751-758. 被引量:253
  • 4Department of Defense Computer Security Center.DoD 5200. 28-STD. Department of Defense Trusted Computer System Evaluation Criteria [S]. USA:DOD, December 1985.
  • 5Trusted Computing Group. TCG Specification Architecture Overview [EB/OL]. [2005-03-01]. https://www.trustedcomputinggroup.org/ groups/ TCG_1_0_Architecture_Overview.pdf.
  • 6Intel Corporation. LaGrande Technology Architectural Overview [EB/OL].[2005-05-01]. http://www.intel.com/technology/security/.
  • 7Patel J,Teacy W T, Luke,et al. A Probabilistic Trust Model for Handling Inaccurate Reputation Sources[C]//Trust Management, Third International Conference, iTrust 2005. Berlin Heidelberg: Springer,2005 : 193-209.
  • 8Beth T, Borcherding M, Klein B. Valuation of Trustin Open Network[C]// Proc of the European Symposium on Research in Security (ESORICS). Brighton:Springer-Verlag, 1994 : 3-18.
  • 9Audun J. An Algebra for Assessing Trust in Certification Chains[C]// Proc of NDSS ' 99, Network and Distributed System Security Symposium. San Diego,California, USA, February 1999.
  • 10Pearson S. Trusted Computing Platform, the Next Security Solution[R]. Bristol UK: HP Laboratories,2002.

共引文献113

同被引文献1

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部