期刊文献+

基于TPM的可信集群系统设计与实现

Design and Implementation of TPM-based Cluster Trusted System
原文传递
导出
摘要 集群系统既有分布式系统的特点,又有单一系统的特征。由于传统集群计算节点缺少可信计算平台的支持,集群作为一个单一的系统缺少可信安全技术的支持。作为一个分布式系统,其可信安全机制和信任链传递机制又很不同于单机系统。在TCG可信计算的规范和可信链的基础之上,提出了可信集群的构架,构建了基于TPM的可信集群,实现了基于可信集群架构的可信集群系统。针对集群中的应用,对所实现的可信集群系统如何解决集群中的可信安全问题作了探讨和研究。 Cluster system is both a distributed system and a single system. For traditional cluster computing node lacks the support of the trusted computing platform, the cluster, as a single system, is in shortage of trusted security technology support, while as a distributed system, its credibility and trusted chain security mechanisms are quite different from the single-transmission mechanism system. So it is necessary to build a cluster framcwork based on the credibility TPM system. On the basis of TCG trusted computing specifications and trusted chain, this paper proposes the trusted cluster architecture, realizing a cluster security trusted system based on the trusted cluster architecture. Aiming at the cluster applications, the trusted security issues with the trusted cluster architecture are explored.
机构地区 中原工学院
出处 《信息安全与通信保密》 2011年第2期46-48,共3页 Information Security and Communications Privacy
关键词 可信计算 可信集群 可信平台模块(TPM) 集群安全 trusted computing trusted duster TPM cluster security
  • 相关文献

参考文献8

  • 1SONZOGNI V E, YOMMI A M, NIGRO N M, et al. A Parallel Finite Element Program on a Beowulf Cluster[J]. Advances in Engineering Software, 2002, 33(07): 427-443.
  • 2TCG Specification Architecture Overview Specification Revision 1.4 2nd August 2007 [EB/OL]. (2007-08-01)[2010-10-16]. http : //www.trustedcomputinggroup.org/files/resouree_files/ AC652DE 1-1D09-3519--ADA026AOC05 CFAC2/TCG_I_g Architecture_Overview.pdf.
  • 3沈昌祥.大力发展我国可信计算技术和产业[J].信息安全与通信保密,2007,29(9):19-21. 被引量:9
  • 4黄涛,沈昌祥.一种基于可信服务器的可信引导方案[J].武汉大学学报(理学版),2004,50(A01):12-14. 被引量:19
  • 5ARBAUGH W A, FARBER D J, SMITH J M. A Secure and Reliable Bootstrap Architecture[C]//IEEE .IEEE Computer Society Conference on Security and Privacy. [s.l.]: IEEE, 1997: 65-71.
  • 6李晓勇,沈昌祥.一个动态可信应用传递模型的研究[J].华中科技大学学报(自然科学版),2005,33(z1):310-312. 被引量:14
  • 7朱璇,郑纬民,汪东升,杨广文.单一系统映象在机群管理中的实现[J].计算机工程与应用,2002,38(7):86-88. 被引量:5
  • 8KIM G H, SPAFFORD E H. The Design and Implementation of Tripwire: A File System Integrity Cbecker[C]//ACM. Proceeding of Computer and Communications Security. New York: ACM, 1994: 18.

二级参考文献4

共引文献39

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部