期刊文献+

一种改进的信任链模型

An Improved Model of Trusted Chain
下载PDF
导出
摘要 基于BIBA模型,对TCG规范中信任链传递过程中的完整性进行了分析,指出信任链传递写入过程中存在的完整性问题,提出了一种改进的信任链传递模型,实现了系统上电到系统装载过程可信校验和访问控制的方法,有效阻止了恶意代码植入和运行。 Based on BIBA model,the integrity of the software components,which in turn boot during the TCG-standardized system startup,is analyzed.And a writing problem is found.To solve the problem,an improved model is proposed.In the model,the integrity checkout and access control are enforced from the chipset power-on to loading process of the system,so that the implant and execution of malicious codes can be effectively prevented.
作者 郑志蓉 顾燕
出处 《舰船电子工程》 2013年第7期79-82,共4页 Ship Electronic Engineering
关键词 信任链 系统完整性 BIBA模型 trusted chain system integrity BIBA model
  • 相关文献

参考文献11

  • 1Trusted Computing Group. TPM Main Part 1 :Design Princi ples Specification Version 1. 2 [EB/OL]. 2006. [2013 -04 -07]. https://www. Trusted computinggroup, org/developers/ tpm.
  • 2Trusted Computing Group. TPM Main Part 2 : TPM Structures Specification version 1-2 [EB/OL]. 2006. [2013-04-07]. ht tps://www. Trusted computinggroup, org/developers/tpm.
  • 3Trusted Computing Group. TPM Main Part 3: Commands Specification Version 1.2[EB/OL]. 2006. [2013-04-07]. ht tps://www. Trustedcomputinggroup. org/developers/tpm.
  • 4Trusted Computing Group. TCG Architecture Overview [EB/ OL]. 2007. [2013-04-07]. https:// www. Trustedcomput inggroup, org/developers/infrastructure.
  • 5Trusted Computing Group. PC Client Work Group PC Client Specific TPM Interface Specification (TIS), Version 1.2 [EB/ OL]. 2007. [2013 -04- 07]. https://www. Trustedeomputing group, org/developers/pc_client.
  • 6Trusted Computing Group. TCG PC Client Specific Implemen tation Specification For Conventional BIOS [EB/OL]. 2007. [2013- 04- 07]. https://www. Trustedcomputinggroup. org/ developers/pc client.
  • 7Ames, S.R. , Jr. , Gasser, M. , and Schell, R.R. Security Kernel Design and Implementation: An Introduction. Comput- er [J]. Computer, 1983, 16(7): 14-22.
  • 8Biba K J. Integrity Considerations for Secure Computer Sys terns [M]. US: Defense Technical Information Center, 1977: 1 -68.
  • 9D E Bell, L J LaPadula. Secure Computer System: Unified ex position and MULTICS interpretation [R]. US:The MITRE Corporation, 1976: 1 -129.
  • 10Lee Badger. Information Security: From Reference Monitors to Wrappers [C]. In proc of 12^th Annual Conference on Com puter Assurance, 1997: 122-124.

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部