期刊文献+

一种可信应用环境的构建方法 被引量:2

Building Approach of Trust Applied Environment
下载PDF
导出
摘要 依据系统应用软件包之间的依赖关系,制定安全标记规则并提出一种应用软件包标记算法,对应用软件包进行分级分类,形成一种应用的层次式结构。利用该层次结构,采用强制访问控制机制和可信计算技术,实现应用层次之间的隔离,减少或消除应用之间非预期的干扰,为用户及其应用提供安全可信的运行环境。 According to system dependencies between packages,this paper proposes a label algorithm and makes security marking rules to classify software packages.An application level-type structure is formed.Based on this structure,it uses the mandatory access control mechanism and trust computing technologies to implement the isolation between the application level,to reduce or eliminate unintended interference between applications,intended for providing the user a safe and credible environment.
出处 《计算机工程》 CAS CSCD 北大核心 2010年第19期59-61,64,共4页 Computer Engineering
基金 国家"973"计划基金资助项目(2007CB311106)
关键词 标记 强制访问控制 可信计算技术 隔离 label mandatory access control trust computing technology isolation
  • 相关文献

参考文献6

  • 1Jaeger T, Sailer R, Shankar U. PRIMA: Policy-reduced Integrity Measurement Architecture[C]//Proc. of the 1 l th ACM Symposium on Access control Models and Technologies. Lake Tahoe, CA, USA: Is. n.], 2006: 19-28.
  • 2Mazikes D, Kaashoek M F. Secure Applications Need Flexible Operating Systems[C]//Proc. of the 6th Workshop on Hot Topics in Operating Systems. New York, USA: [s. n.], 1997.
  • 3陈健.Linux高级程序设计[M].北京:人民邮电出版社,2008.
  • 4Graubart R. Operating System Support for Trusted Applications[C]// Proc. of the 15tli IEEE National Computer Security Conference. [S. l.]: IEEE Press, 1992.
  • 5蔡谊.支持可信操作平台的安全操作系统研究[D].武汉:海军工程大学,2005.
  • 6郑志蓉,沈昌祥.支持应用类安全的操作系统安全结构框架设计[J].计算机工程与应用,2002,38(22):45-47. 被引量:4

二级参考文献3

  • 1Winfried E Kuhnhauser. A Paradigm For User-Defined Security Poli-cies[J].IEEE Computer, 1995-02:135~144
  • 2Antony Edwards,Gernnt Heiser. Components+Security=OS Extensibili-ty[J].IEEE Computer, 2001-03: 27~34
  • 3Dr Roger R Schell,Michael Thompson. Platform Security:What isLacking[R].Information Security Technical Report,2000;5(1) :27~41

共引文献7

同被引文献16

  • 1杨涛,沈昌祥,陈福接.一个用于安全操作系统特权管理的改进Bell-La Padula模型[J].计算机研究与发展,1993,30(1):45-49. 被引量:7
  • 2沈昌祥,张焕国,冯登国,曹珍富,黄继武.信息安全综述[J].中国科学(E辑),2007,37(2):129-150. 被引量:358
  • 3李晓勇,左晓栋,沈昌祥.基于系统行为的计算平台可信证明[J].电子学报,2007,35(7):1234-1239. 被引量:35
  • 4Trusted Computing Group. TCG Specification Architecture Over- view[EB/OL]. (2007-08-15). http://www.trustedcomputinggroup. org/resources/tcg architecture_overview_version_ 14/.
  • 5Sailer R, Jaeger T. Design and Implementation of a TCG-based Integrity Measurement Architecture[C]//Proc. of the 13th USENIX Securitv Svmoosium. San Diego, USA: [s. n.], 2004.
  • 6Rene K, Ahmad R S, Christian S, et al, A Practical Property-based Bootstrap Architecture[C]//Proc. of 2009 ACM Workshop on Scalable Trusted Computing. Chicago, Illinois, USA: [s. n.], 2009.
  • 7Ahmad R S. Property-based Attestation for Computing Platforms: Caring About Properties, Not Mechanisms[C]//Proc. of 2004 New Security Paradigms Workshop. Virginia Beach; USA: [s. n.], 2004.
  • 8Kuhn U, Selhorst M. Realizing Property-based Attestation and Sealing with Commonly Available Hard and Software[C]//Proc. of 2007 ACM Workshop on Scalable Trusted Computing. New York, USA: [s. n.], 2007.
  • 9Li Xiaoyong, Zuo Xiaodong. An Efficient Attestation for Trust- worthiness of Computing Platform[C]//Proc. of 2006 Int'l Conf. on Intelligent Information Hiding and Multimedia Signal Processing. Pasadena, USA: [s. n.], 2006.
  • 10Haldar V, Chandra D, Franz M. Semantic Remote Attestation: AVirtual Machine Directed Approach to Trusted Computing[C]// Proc. of the 3rd Virtual Machine Research and Technology Symposium. Berkeley, USA: [s. n.], 2004.

引证文献2

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部