期刊文献+

一种基于Xen的信任虚拟机安全访问设计与实现 被引量:13

Design and Implementation of Access Control Model Using Trusted Virtual Machine Based on Xen
下载PDF
导出
摘要 结合信任计算技术与虚拟化技术,提出了一种基于Xen的信任虚拟机安全访问机制,为用户提供了一种有效的安全访问敏感数据的模式。其核心思想是利用虚拟机的隔离性,为数据信息应用提供一个专用的隔离环境,同时利用信任计算技术保证该虚拟平台配置状态的可信性。 Combining trusted computing and virtualization,an access control model using trusted virtual machine based on Xen is proposed which provides user a model to access data safely.The key idea is using the isolation of virtual machine to provide an eTPlusive environment for sensitive data and use trusted computing to ensure the virtual environment is trusted.
作者 程川
出处 《计算机与数字工程》 2010年第3期109-111,149,共4页 Computer & Digital Engineering
关键词 虚拟化 XEN 访问控制 TPM virtualization Xen access control TPM
  • 相关文献

参考文献5

  • 1P. M. Chen, B. D. Noble. When virtual is better than real [C]//Proceedings of the 8th Workshop on Hot Topics in Operating Systems, Washington, DC, USA, IEEE Computer Society, 2001 : 133.
  • 2Tal Garfinkel, Ben Pfaff, Jim Chow, et al. Terra: A Virtual Machine-Based Platform for Trusted Computing [C]//Proc. of ACM Symposium on Operating Systems Principles (SOSP), 2003.
  • 3P. Barham, B. Dragovic, K. Fraser, et al. Xen and the Art of Virtualization[C]//Proceedings of the 19th ACM SOSP,2003(8) : 164-177.
  • 4张焕国,罗捷,金刚,朱智强,余发江,严飞.可信计算研究进展[J].武汉大学学报(理学版),2006,52(5):513-518. 被引量:114
  • 5Trusted Computing Group. TPM Main Specification Level 2 Version 1. 2, Revision 103 Part a-Commands [EB/OL]. http.//www, trustedcomputinggroup, org, 2005.

二级参考文献19

  • 1张焕国,毋国庆,覃中平,刘玉珍,刘毅,彭涛,韩永桥.一种新型安全计算机[J].武汉大学学报(理学版),2004,50(A01):1-6. 被引量:21
  • 2张焕国,刘玉珍,余发江,周强,叶新.一种新型嵌入式安全模块[J].武汉大学学报(理学版),2004,50(A01):7-11. 被引量:7
  • 3林闯,彭雪海.可信网络研究[J].计算机学报,2005,28(5):751-758. 被引量:253
  • 4Department of Defense Computer Security Center.DoD 5200. 28-STD. Department of Defense Trusted Computer System Evaluation Criteria [S]. USA:DOD, December 1985.
  • 5Trusted Computing Group. TCG Specification Architecture Overview [EB/OL]. [2005-03-01]. https://www.trustedcomputinggroup.org/ groups/ TCG_1_0_Architecture_Overview.pdf.
  • 6Intel Corporation. LaGrande Technology Architectural Overview [EB/OL].[2005-05-01]. http://www.intel.com/technology/security/.
  • 7Patel J,Teacy W T, Luke,et al. A Probabilistic Trust Model for Handling Inaccurate Reputation Sources[C]//Trust Management, Third International Conference, iTrust 2005. Berlin Heidelberg: Springer,2005 : 193-209.
  • 8Beth T, Borcherding M, Klein B. Valuation of Trustin Open Network[C]// Proc of the European Symposium on Research in Security (ESORICS). Brighton:Springer-Verlag, 1994 : 3-18.
  • 9Audun J. An Algebra for Assessing Trust in Certification Chains[C]// Proc of NDSS ' 99, Network and Distributed System Security Symposium. San Diego,California, USA, February 1999.
  • 10Pearson S. Trusted Computing Platform, the Next Security Solution[R]. Bristol UK: HP Laboratories,2002.

共引文献113

同被引文献101

引证文献13

二级引证文献75

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部