期刊文献+

可信网络连接架构TCA的实现及其应用 被引量:7

The Implementation and Application of Trusted Connect Architecture
下载PDF
导出
摘要 随着计算机网络的深度应用,最突出的威胁是:恶意代码攻击、信息非法窃取、数据和系统非法破坏,其中以用户秘密信息为目标的恶意代码攻击超过传统病毒成为最大安全威胁,这些安全威胁的根源在于缺乏体系架构层次的计算机的恶意代码攻击免疫机制,导致无法实现计算网络平台安全、可信赖地运行.可信网络连接是在此背景下提出的一种技术理念,它通过建立一种特定的完整性度量机制,使网络接入时不仅对用户的身份进行鉴别,还可提供对平台鉴别,就是基于平台完整性评估,具备对不可信平台的程序代码建立有效的防治方法和措施.根据我国已有的可信网络连接国家标准,给出可信连接架构TCA的实现及其相关的支撑技术,最后探讨了可信连接架构TCA技术的应用范围. With the deep application of computer network, the main threats in network includes malicious code attacks, illegal information theft, data and system illegal destruction and so on. In these threats, malicious code attacks targeting users’ privacy information becomes the biggest security threat beyond traditional virus. The root of these security threats lies in the lack of architecture-level computer malicious code attack immune mechanism which can help the computer immune system to prevent malicious code attacks , and make sure the computing network platform operate securely and reliably. Therefore, the technical concept of trusted network connection was proposed. Through establishing a specific mechanism of integrity measurement can achieve platform authentication in addition to the authentication of user’s identity in network access process. Platform authentication is an effective methods to prevent illegal accessing of untrustworthy platform with malicious code. This paper presents implementation and related supporting technologies of TCA specified in China national standards, and discusses the application of TCA.
出处 《信息安全研究》 2017年第4期332-338,共7页 Journal of Information Security Research
关键词 可信计算 可信网络连接 平台鉴别 完整性度量 三元对等实体鉴别 可信连接架构 trusted computing trusted network connection platform authentication integrity measurement tri-element peer authentication trusted connect architecture
  • 相关文献

参考文献2

二级参考文献10

  • 1张焕国,罗捷,金刚,朱智强.可信计算机技术与应用综述[J].计算机安全,2006(6):8-12. 被引量:20
  • 2Trusted Computing Platform Alliance. TCP A DesignPhilosophies and Concepts Version 1. 0 [S]. https: //www. trustedcomputinggroup. org,Jan2001.
  • 3Trusted Computing Group. TCG Infrastructure WorkingGroup Reference Architecture for Interoperability(Part I ) Specification Version 1. 0[S]. https://www.trustedcomputinggroup. org. 2005,6.
  • 4Trusted Computing Group. TCG PC Specified ImplementationSpecification Version 1. 1 [S] . https: //www. trustedcomputinggroup. org. Aug, 2003.
  • 5Trusted Computing Group. TCG Specification ArchitectureOverview Specification Revision 1. 2 [S] . https://www. trustedcomputinggroup. org,Apr2004.
  • 6Trusted Computing Group. Trusted Platform ModuleMain Specification, Part 1: Design Principles, Part 2:TPM Structures, Part 3: Commands, Version 1. 2,Revision 85 [S]. https : //www. trustedcomputinggroup.org, 2005,6.
  • 7Trusted Computing Group. TCG Trusted NetworkConnect TNC architecture for interoperability specificationRevision 1. 0[S]. https://www. trustedcomputinggroup.org/group/network, May2005.
  • 8Trusted Computing Group. Open Standards for Integrity-based Network Access Control, https://www.trustedcomputinggroup. org/group/network/,Oct2005.
  • 9K. j. biba Integrity considerations for secure computersystems [R]. Technical Report, ESD-TR-76-372, Bedford, M A : USAF Electronic Systems Division,Hanscom AirForce Base, 1977.
  • 10沈昌祥.基于积极防御的安全保障框架[J].中国信息导报,2003(10):50-51. 被引量:22

共引文献21

同被引文献65

引证文献7

二级引证文献43

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部