期刊文献+

可信管道模型研究

Research of trusted channel model
下载PDF
导出
摘要 针对可信计算基(TCB)可信扩展过程中涉及的隔离问题,提出了可信管道模型。对可信管道进行了形式化描述,给出了构成元素、建立规则和传输规则;分析了基本属性,证明了可信管道支撑下的TCB可信扩展符合非传递无干扰模型;分析了可信管道模型的安全性;给出了一个可信管道的实施框架。 According to the problem of space isolating in the process of Trusted Computing Base(TCB) trusted expanding,a trusted channel model is proposed.The components of the trusted channel and two rules which are the rule of making trusted channel and the rule of transporting data are formally described.The secure property of trusted channel is analyzed.At last the trusted channel is proved to conform to the intransitive noninterference model,and an implementation framework is put forward.
出处 《计算机工程与应用》 CSCD 北大核心 2011年第26期70-73,82,共5页 Computer Engineering and Applications
基金 国家高技术研究发展计划(863)No.2009AA01Z437~~
关键词 可信计算 可信计算基 可信管道 无干扰 trusted computing Trusted Computing Base(TCB) trusted channel noninterference
  • 相关文献

参考文献6

  • 1Department of Defense.DOD 5200.28-STD Trusted Computer System Evaluation Criteria[S].December 1985.
  • 2GB17859-1999.计算机信息系统安全保护等级划分准则[S].[S].,1999..
  • 3李勇,王飞,胡俊,沈昌祥.TCB可信扩展模型研究[J].计算机工程与应用,2010,46(13):1-3. 被引量:4
  • 4Ye Z, Smith S.Trusted paths for browsers:an open-source solution to Web spoofing[C]//Proceedings of the 11th USENIX Security Symposium, 2002: 263 -279.
  • 5廖建华,赵勇,沈昌祥.基于管道的TCB扩展模型[J].北京工业大学学报,2010,36(5):592-596. 被引量:2
  • 6Rushby J.Noninterference, transitivity, and channel-control security policies, Tech Rep: CSL-92-02[R].Stanford Research Institute, 1992.

二级参考文献15

  • 1陈泽茂.安全操作系统的恶意代码防御体系研究[D].武汉:海军工程大学,2004.
  • 2Trusted Computing Group.TCG specification architecture overview[R/OL].http://www.trustedcomputinggroup.org/groups/TCG_1-0-Architecture_Overview.pdf.
  • 3Department of Defense Standard.CSC-STD-001-83 Department of defense trusted computer system evaluation criteria[S].DoD Computer Security Center,1983.
  • 4Loscocco P,Smalley S.Integrating flexible support for security polities into the linux operating system[C]//Proceedings of USENIX Annual Technical Conference,2001:29-42.
  • 5蔡谊.支持可信操作平台的安全操作系统研究[D].武汉:海军工程大学,2005.
  • 6Shockley W,Schell R R.TCB subsets for incremental evaluation[C]//Proceedings of the 3rd Aerospace Computer Security Conference,1987.
  • 7MOHAN C. Survey of recent operating systems research, designs and implementations[ J]. ACM SIGOPS Operating Systems Review, 1978, 12(1):53-89.
  • 8KRISTAL T P, SCOTT A B. Efficient access control for distributed hierarchical file systems[ C ]// Proceedings of the 22nd IEEE/13th NASA Goddard Conference on Mass Storage Systems and Technologies. Washington DC, USA: IEEE Computer Society, 2005: 253-260.
  • 9PHILLIPS L. Windows Vista security: first impressions[ J]. Information Security Tech Report, 2006, 11 (4) : 176-185.
  • 10MICHAEL H, STEVE L. Inside the Windows security push[J]. IEEE Security and Privacy, 2003, 1( 1 ) : 57-61.

共引文献56

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部