期刊文献+

可信计算环境构建机制研究进展 被引量:5

Research progress of trusted computing environment
下载PDF
导出
摘要 可信计算环境构建是通过软硬件结合的方式构建满足可信计算定义的系统,使其上进行的计算具有真实性、机密性、可控性等特性,并利用这些特性来弥补仅依靠传统安全防护方式的不足,从而更好地解决计算机安全面临的挑战和问题。介绍了可信计算环境构建的硬件基础,归纳了近年来基于静态可信度量根、动态可信度量根以及轻量虚拟机监控器的可信计算环境的构建机制,分析了现有可信计算环境构建机制的优势和不足;通过对可信计算环境中信任链的分析,指明了今后的研究方向。 Trusted computing environment provides a new arena to address the challenges in computer security by combining software and hardware to meet the definition of trusted computing. The authenticity, confidentiality, controllability and other properties that it provides can make up the deficiencies of traditional security methods. This paper describes the hardware basis of trusted computing, summarizes the recent trusted computing environment which is based on the DRTM (Dynamic Root of Trust for Measurement) and SRTM (Static Root of Trust for Measurement), analyzes the advantages and disadvantages of existed trusted computing environment, and indicates the direction of future research by analyzing the trust chain.
作者 程戈 李聪
出处 《计算机工程与应用》 CSCD 2013年第13期59-64,197,共7页 Computer Engineering and Applications
基金 国家自然科学青年基金(No.61202397) 湘潭大学科研启动费项目(No.11QDZ42)
关键词 可信计算环境 信任链 可信度量根 trusted computing environment chain of trust root of trust measurement
  • 相关文献

参考文献28

  • 1Dyer J Gv Lindemann M,Perez R,et al.Building the IBM4758 secure coprocessor[J].IEEE Computer,200l,34( 10) :57-66.
  • 2Lie D, Thekkath C, Mitchell M, et al.Architectural support for copy and tamper resistant software[C]//Proceedings of the 9th International Conference on Architectural Support for Pro?gramming Languages and Operating Systems, Cambridge, MA, USA,2000: 168-177.
  • 3Suh G, Clarke D, Gassend B ,et al.ARGIS: architecture for tamper?evident and tamper resistant processing[C]//Proceedings of the 17th International Conference on Supercomputing, San Fran?cisco, CA, USA,2003: 160-171.
  • 4Chen B, Morris T.Certifying program execution with secure processors[C]//Proceedings of the 9th Hot Topics in Operating Systems .Lihue .Hawaii , USA,2003, 9 :23-29.
  • 5Trusted Computing Group. TCG 1_4 architecture overview[EB/OL].[2012-10-0 I].http://www. Trustedcomputinggroup.org/files/resource_ files/ AC652DE II 09-3 519-ADA026AOC05CFAC2/TCG _1_ 4 Architecture_Overview. pdf.
  • 6Intel Corporation.Intel trusted execution technology software development guide[EB/OL].[2012-10-01].http://www.intel.com/ technology/security/down-Ioads/315168.htm.
  • 7Advanced Micro Devices.AMD64 virtualization: secure virtual machine architecture reference manual[M].[S.l.]: AMD Publi?cation, 2005-05.
  • 8Marchesini J, Smith S.SHEMP: secure hardware enhanced MyProxy[C]//Proceedings of 3rd Annual Conference on Privacy, Security and Trust, New Brunswick, Canada, 2005.
  • 9Trustedgrub[EB/OL].[2012-1 0-0 l].http://sourceforge.netlprojects/ trustedgrub.
  • 10MacDonald R, Smith S W, Marchesini J, et al.Bear: an open?source virtual secure coprocessor based on TCPA, Technical Report TR2003-4-71[R].Hanover, New Hampshire: Dartmouth College ,2003.

同被引文献47

引证文献5

二级引证文献54

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部