期刊文献+

可信计算中远程证明方法研究

Study of remote attestation in trusted computing
下载PDF
导出
摘要 可信计算是当前计算机安全领域的研究热点,根据可信计算中远程证明的特性,对可信计算中远程方法进行分析,介绍现有几种比较典型的远程证明方案的基本思想和认证模型,对比分析各种远程证明方法各自的优缺点,对其进行分类总结各自的使用条件,并指出了远程证明的进一步的发展方向. Trusted computing is a hot issue in current computer security field. According to its characteris- tics, the paper analyzes the remote attestation method in the trusted computing, introduces several typical schemes of remote attestation and certification model, and compares the advantages and disadvantages of all kinds of remote attestation methods. Based on the analysis of the classification and summarization of the employment conditions, the further development direction is presented in the paper.
作者 余丽华
出处 《南昌工程学院学报》 CAS 2012年第4期29-33,共5页 Journal of Nanchang Institute of Technology
关键词 可信计算 远程证明 trusted computing remote attestation
  • 相关文献

参考文献8

  • 1Sailer R,Zhang X L,Jaeger T,et al.Design and implementation of a TCG-based integrity measurement architecture[A].In:Proc.of the 13th Usenix Security Symp[C].San Diego:Usenix Press,2004:16-16.
  • 2Seshadri A,Perrig A,Doorn L V,et al.SWATT:Software-Based attestation for embedded devices[A].In:Proc.of the IEEE Securi-ty&Privacy Conf[C].Oakland:IEEE Press,2004:272-282.
  • 3Garfinkel T,Rosenblum M,Boneh D.Flexible OS support and applications for trusted computing[A].In:Proc.of the 9th Workshopon Hot Topics in,Operating Systems(HotOS IX)[C].Hawaii:Usenix Association,2003:25-25.
  • 4Haldar V,Chandra D,Franz M.Semantic remote attestation:A virtual machine directed approach to trusted computing[A].In:Proc.of the USENIX Virtual Machine Research and Technology Symp[C].San Jose:Usenix Press,2004:29-41.
  • 5Poritz J,Schunter M,Herreweghen E V,et al.Property attestation-Scalable and privacy-friendly security assessment of peer comput-ersr[R].IBM Research Report,RZ 3548,2004.
  • 6Sadeghi A,Stüble C.Property-Based attestation for computing platforms:Caring about properties,not mechanisms[A].In:Proc.ofthe New Security Paradigms Workshop[C].Nova Scotia:ACM Press,2004:67-77.
  • 7Chen L Q,Landfermann R,Lhr H,et al.A protocol for property-based attestation[A].In:roc.of the 1st ACM Workshop on Scala-ble Trusted Computing[C].Nova Scotia:ACM Press,2006:7-16.
  • 8李晓勇,左晓栋,沈昌祥.基于系统行为的计算平台可信证明[J].电子学报,2007,35(7):1234-1239. 被引量:35

二级参考文献15

  • 1黄涛,沈昌祥.一种基于可信服务器的可信引导方案[J].武汉大学学报(理学版),2004,50(A01):12-14. 被引量:19
  • 2Roger L Kay.How to Implement Trusted Computing,A Guide to Tighter Enterprise Security[OL].https://www.trustedcomputinggroup.org/news/Industry-Data/Implementing-Trusted-Computing-RK.pdf.
  • 3Microsoft.Next-generation secure Application base[OL].http://www.microsoft.com/resources/ngscb.
  • 4R Sailer,X Zhang,T Jaeger,L van Doorn.Design and implementation of a TCG-based integrity measurement architecture[A].In Proceedings of USENIX Security Symposium[C].Lake Tahoe,California,USA:ACM Press,Aug.2004.223-238.
  • 5A Seshadri,A Perrig,L van Doorn,P Khosla.SWAtt:SoftWare-based Attestation for embedded devices[A].In Proceedings of IEEE Symposium on Security and Privacy[C].Oakland,CA,USA:IEEE Press,May 2004.272-282.
  • 6V Haldar,D Chandra,M Franz.Semantic remote attestation-a virtual machine directed approach to trusted computing[A].In Proc.of the Third virtual Machine Research and Technology Symposium[C].San Jose,CA,USA:USENIX,2004.29-41.
  • 7E Shi,A Perrig,L van Doorn.Bind:A fine-grained attestation service for secure distributed systems[A].In Proc of the IEEE Symposium on Security and Privacy[C].Oakland,CA,USA:IEEE Press,2005.154-168.
  • 8Ahmad-Reza Sadeghi,Christian Stüble.Property-based Attestation for Computing Platforms:Caring about properties,not mechanisms[A].In Proceedings of the 2004 Workshop on New Security Paradigms[C].Nova Scotia,Canada:ACM Press,2004.66-77.
  • 9J Poritz,M Schunter,E V Herreweghen,M Waidner.Property attestation-scalable and privacy-friendly security assessment of peer computers,IBM Research Report RZ 3548,2004[OL].http://domino.watson.ibm.com/library/cyberdig.nsf/papers/215E33CB2B4F7FA485256E97002A0D6C/$File/rz3548.pdf.
  • 10TCG.TCG Specification Architecture Overview,Version1.2[S].https://www.trustedApplicationgroup.org.

共引文献34

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部