期刊文献+

基于TPM的资源共享模型及访问机制 被引量:2

Research of Resource Sharing Model and Access Mechanism Based on TPM
下载PDF
导出
摘要 传统的资源共享模式存在资源本身的不安全和过于简单的访问控制等问题,从而造成共享资源的恶意泄露.基于此,本文在传统资源共享模型的基础上,引入了可信平台模块(trusted platform module),利用TPM的安全数据存储功能对共享资源进行密封存储,并利用(usage control)模型对共享资源进行访问控制,从而构建了基于可信平台模块TPM的高度安全的层次化资源共享模型. The traditional sharing pattern of resource is easy to cause the leaks malicious of the shared resource because of insecurity of resources and too simple access control.According to this,the paper introduces trusted platform module TPM based on traditional resource sharing model.The sharing resources are sealed to store by using TPM's function of secure data storage.Users can access to sharing resources by UCON model.And then the paper constructs a hierarchical sharing model with high security based on TPM.
出处 《河北大学学报(自然科学版)》 CAS 北大核心 2010年第4期445-448,共4页 Journal of Hebei University(Natural Science Edition)
基金 河北省教育厅指导项目(Z2009306) 保定科技局支撑计划项目(09ZG001)
关键词 可信平台模块 使用控制 资源共享 访问机制 trusted platform module usage control resource sharing access mechanism
  • 相关文献

参考文献5

二级参考文献24

  • 1史忠植,董明楷,蒋运承,张海俊.语义Web的逻辑基础[J].中国科学(E辑),2004,34(10):1123-1138. 被引量:71
  • 2[1]Carlsen S.Conceptual modeling and composition of flexible workflow models[D].Norway:Dept of Computer Science,Norwegian University of Science and Technology,1998.
  • 3[2]Joeris G,Herzog O.Towards flexible and high-level modeling and enacting of processes[C]∥Jarke M,Oberwers A.Proceedings of the 11th International Conference on Advanced Information Systems Engineering.Heidelberg:Springer-Verlag,1999:88-102.
  • 4[3]Foster I,Kesselman C,Nick J,et al.Grid services for distributed system integration[J].Computer,2002,35(6):37-46.
  • 5[4]Li W,Xu Z,Dong F,et al.Grid resource discovery based on routing-transferring model[C]∥Parashar.Proceedings of the 3rd International Workshop on Grid Computing.Berlin:Springer-Verlag,2002:145-156.
  • 6JAEGER T,TIDSWELL J E.Practical safety in flexible access control models[J].ACM Transactions on Information and Systems Security,2001,4(3):34-58.
  • 7KOCH M,MANCINI L V,PARISI-PRESICCE F.Decidability of safety in graph-based models for access control[J].ACM European Symposium on Research in Computer Security,2002,21(7):2502-2548.
  • 8LI N,TRIPUNITARA M V.Security analysis in role-based access control[J].ACM Symposium on Access Control Models and Techniques,2004,9(1):28-46.
  • 9ZHANG X,PARK J,PARISI-PRESICCE F,et al.A logical specification for usage control[J].ACM Symposium on Access Control Models and Technologies,2004,18(9):1-26.
  • 10ZHANG Xin-wen.Formal model and analysis of usage control[J].ACM Symposium on Access Control Models and Technologies,2006,5(1):122-153.

共引文献12

同被引文献4

引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部