期刊文献+

开放环境下的远程证明体系架构设计

DESIGNING REMOTE ATTESTATION ARCHITECTURE IN OPEN ENVIRONMENTS
下载PDF
导出
摘要 虚拟化技术和证明技术相互依赖,只有两者相互结合,才能为安全系统奠定坚实的基础。首先给出在开放环境下使用证明技术建立信任关系需要解决的问题,然后提出一种支持远程证明的安全体系架构Sec_TV,讨论该架构如何结合虚拟化和证明技术来增强系统的安全性,并给出Sec_TV下远程证明协议设计,最后,从Sec_TV体系架构本身及Sec_TV远程证明协议两个方面讨论这个远程证明体系架构的安全性。 The virtualisation and proven technologies are the interdependent techniques; only by combining these two can lay sound foundation for security system. First, in the paper we suggest the problems to be resolved during establishing trust relationship in open distributed environments with proven technology. Secondly, we present a secure architecture See TV which supports the remote attestation, and discuss this architecture in terms of combinJng the virlualJsation and proven technologies to enhance the security of the system, and then we provide the design of remote attestation protocol on Sec_TV. Finally, we discuss the security of the remote attestation architecture from two aspects of both Sec_TV architecture itself and Sec_TV remote attestation protocol.
出处 《计算机应用与软件》 CSCD 北大核心 2012年第8期86-89,105,共5页 Computer Applications and Software
基金 国家重点基础研究发展计划(2007CB310907)
关键词 可信计算 虚拟化 远程证明 TCM vTCM Trusted computing Virtualisation Remote attestation TCM vTCM
  • 相关文献

参考文献11

  • 1http ://www. trustedcomputing, com/.
  • 2Stumpf F,Tafreschi O, Roder P,et al. A Robust Integrity Reporting Pro- tocol for Remote Attestation [ C]//Second Workshop on Advances in Trusted Computing (WATC'06 Fall),Tokyo,Japan,November 2006.
  • 3Sailer R, Zhang Xiaolan, Jaeger T, et al. Design and Implementation of a TCG-Based Integrity measurement architecture [ R ]. IBM Research Report.
  • 4Jaeger T, Sailer R, Shankar U. PRIMA : Policy-Reduced Integrity Meas- urement Architecture [ C ]//SACMAT '06 : Proceedings of the eleventh ACM symposium on Access control models and technologies, New York, NY, USA ,2006 : 19 - 28.
  • 5Chen Liqun, Landfermann R, Rohe M, et al. A protocol for property- based attestation [ C ]//STC' 06 :Proceedings of the first ACM workshop on Scable trusted computing,2006:7-16.
  • 6Haldar V, Chandra D, Franz M. Semantic Remote Attestation:A Virtual Machine Directed Approach to Trusted Computing[ C ]//USENIX Vir- tual Machine Research and Technology Symposium,2004.
  • 7Madnick S E, Donovan J J. Application and Analysis of the Virtual Ma- chine Approach to Information System Security and Isolation [ C ]//Pro- ceedings of the Workshop on Virtual Computer Systems, New York, NY. USA. 1973:210 - 224.
  • 8Garnkel T, Pfa B, Chow J, et al. Terra : A Virtual Machine-Based Plat- form for Trusted Computing [ C ]//SOSP'03 : Proceedings of the nine- teenth ACM symposium on Operating Systems Principles, New York, NY, USA ,2003 : 193 - 206.
  • 9Jansen B, Ramasamy H, Schunter M. Flexible Integrity Protection and Vefication Architecture for Virtual Machine Monitors [ C ]//Second Workshop on Advances in Trusted Computing, 2006.
  • 10于颖超,刘了.一种结合可信计算和虚拟化技术的安全平台架构设计[J].高性能计算技术,2011(4).

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部