期刊文献+

基于虚拟机的可信计算 被引量:4

Trusted Computing Based on Virtual Machine
原文传递
导出
摘要 当前,虚拟机技术和可信计算技术是两大热门技术,可信计算技术是实现信息系统安全的重要手段。是否可以在虚拟机的环境下,通过结合虚拟机和可信计算的技术优势,来实现终端系统与网络的可信,提高整个信息系统的安全?研究了如何设计一个基于虚拟机的可信计算平台安全架构,并进一步研究了虚拟化TPM的问题。同时,分析并总结了TCG定义的可信链技术。在此基础上,提出了虚拟机环境下可信链的实现方法,加强终端系统与网络的安全性。 Nowadays,the virtual machine technology and the trusted computing technology have become the two popular technologies. The trusted computing technology is an important means for achieving information system security. Is it possible to realize the trusted of terminal system and network by combining the technical superiorities of virtual machine and trusted computing in a virtual machine environment,and thus to enhance the security of the whole information system? A security framework for trusted computing platform based on virtual machine is studied and designed,and also the TPM issue in the virtual environment is discussed. Meanwhile,based on analysis and summary of the trusted chain technology defined by TCG,an implementation method for the trusted chain in the virtual machine environment is proposed,thus to strengthen the security of the terminal system and network.
作者 韩春林 舒斌
出处 《信息安全与通信保密》 2010年第7期81-83,共3页 Information Security and Communications Privacy
关键词 虚拟机 可信计算 可信平台 可信链 virtual machine trusted computing trusted computing platform(TCP) trusted chain
  • 相关文献

参考文献8

二级参考文献48

共引文献32

同被引文献20

  • 1谭良,佘堃,周明天.CRL增量-过量发布综合模型研究[J].计算机科学,2005,32(4):133-136. 被引量:10
  • 2CHEN Haibo,CHEN Jieyun,MAO Wenbo,et al.Daonity-Grid Security from Two Levels of Virtualization[J].Elsevier Information Security Technical Report,2007,03(12):123-138.
  • 3SONG Zhexuan,LEE Sung,MASUOKA Ryusuke.Trusted Web Service[EB/OL].(2006-12-1)[2010-8-16].http://www.flacp.fujitsulabs.com/rmasuoka/papers/20061201-WATC06-TWS-Paper.pdf.
  • 4顾青,吴志刚,邓琳,等.GB/T19713—2005——信息技术安全技术公钥基础设施在线证书状态协议[S].北京:中国标准出版社.2005.
  • 5袁峰,郭晓雷,杨恒亮,等.GB/T25059—2010-信息安全技术公钥基础设施简易在线证书状态协议[S].北京:中国标准出版社,2011.
  • 6何立波,姜玉琳,袁文恭,等.GB/T20518—2006——信息安全技术公钥基础设施数字证书格式[S].北京:中国标准出版社,2007.
  • 7NIST. Cloud Computing Synopsis and Recommendations[EB/OL]. (2012-5)[2012-8-15]. http: //csrc.nist.gov/publications/ nistpubs/800-146/sp800-146.pdf.
  • 8NIST. Guidelines on Security and Privacy in Public Cloud Computing[EB/OL]. (2011-12)[2012-8-18]. http: //csrc. nist.gov/publications/nistpubs/800-144/SP800-144.pdf.
  • 9NIST. Guide to Security for Full Virtualization Technologies[EB/OL]. (2011-1)[2012-8-21]. http: //csrc. nist.gov/publications/nistpubs/800-125/SP800-125-final.pdf.
  • 10朱海卫,施蕾.浅议可信计算的发展[J].信息安全与通信保密,2009,31(3):79-81. 被引量:6

引证文献4

二级引证文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部