期刊文献+

基于X86架构的安全BIOS系统实现方案 被引量:1

The scheme of security BIOS system based on processor architecture X86
下载PDF
导出
摘要 文中在论述Intel、微软和TCG所提出的可信计算机实现框架的基础上,对目前出现的安全增强型BIOS系统进行了分析。基于此,提出了一种集计算机硬软件系统于一体的X86架构的可信计算机实现框架,描述了框架中各组件模块的功能及框架特点,设计了实现框架中BIOS系统的安全模块,并对其安全性进行了分析。 Based on the implement framework of the trusted computer proposed by Intel, Microsoft and TCG, this paper analyses the security-enhanced BIOS system. Based on this, this paper gives a implement frame of trusted computer for X86 system with collection computer hardware and software in a body, describes the component module's functions and characters of the framework, designs the security modules of BIOS system, and finally, analyses the framework's security.
出处 《电子设计工程》 2013年第1期28-30,33,共4页 Electronic Design Engineering
关键词 X86架构 安全BIOS 引导 可信计算机 TPM processor architecture x86 security BIOS boot trusted computer TPM
  • 相关文献

参考文献1

二级参考文献7

  • 1WfMC. TC00-1019:Workflow Management Coalition Workflow Security Considerations White Paper[S]. http://www. wfmc.org, 1998.
  • 2Miller J A, etal. Security in Web-based Workflow Management Systems[C].ACM Trans. on Information and System Security, 2002.
  • 3Sandhu RS, Coyne E J, Feinstein H L, Youman C E. Role Based Access Control Models[J]. In IEEE Comnputer, 1996,29(2):38-47.
  • 4Kandala S, Sandhu R. Secure Role-based Workflow Models[J]. In Proceedings of the 15th IFIP WG 11.3 Wonking Conference on Database Security,Kluwer 2002: 45 - 58.
  • 5Kumar A, Kamik N, Chafle G. Context Sensitivity in Role-based Access Control[J]. ACM SIGOPS Operating Systems Review, July 2002.
  • 6邓集波,洪帆.基于任务的访问控制模型[J].软件学报,2003,14(1):76-82. 被引量:222
  • 7石文昌,孙玉芳.多级安全性政策的历史敏感性[J].软件学报,2003,14(1):91-96. 被引量:19

共引文献23

同被引文献3

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部