期刊文献+

移动可信平台的发展与研究 被引量:2

The Development and Research of Mobile Trusted Platform
下载PDF
导出
摘要 随着通信技术和互联网技术的不断融合,移动终端应用越来越广泛,与此同时安全问题正逐渐成为其众多应用推广的主要障碍。可信计算技术是有效解决移动终端安全问题的一种新思路。该文在阐述可信计算一些重要概念的基础上,对可信计算组织定义的移动可信模块(Mobile Trusted Module,MTM)的结构和特点进行了详细描述,介绍了当前增强移动平台安全的TrustZone及M-Shield技术,并且着重分析了两种可行的MTM的实现技术。最后对移动可信计算技术未来的研究方向进行了展望。 With the combining of communication technology and internet technology, the mobile devices are becoming more widespread. But the security issue has become a major obstacle of many applications. It is a creative approach to solve the security problems of mobile devices by using the trusted computing technology. In this paper, we described some important concepts of the trusted computing, and the key component of structure and characteristics of Mobile Trusted Module defined by the Trusted Computing Group in detail. Then we introduced the TrustZone and M-Shield technology of current safety mobile platform to enhance, and focused on analysis of two possible technologies of MTM implementation. Finally the future research directions of mobile trusted computing technology are also prospected.
出处 《电脑知识与技术(过刊)》 2010年第3X期1833-1835,共3页 Computer Knowledge and Technology
基金 国家科学自然基金(60903040) 校预研(JC-08-06-01)
关键词 可信计算 移动可信模块 TrustZone技术 M-Shield JAVA卡 trusted computing mobile trusted module TrustZone technology M-Shield Java card
  • 相关文献

参考文献10

  • 1一辉.张翔:移动终端智能化的信息安全[J].通信世界,2009(15). 被引量:1
  • 2SuGil Choi,JinHee Han,JeongWoo Leeet al.Implementation of a TCG-Based Trusted Computing in Mobile Device[]..
  • 3Trusted Computing Group.TCG specification architecture overview.. http://www.Trustedcomputinggroup.org/groups/TCG_1_0_Architecture_Overview.pdf . 2005
  • 4NTT DoCoMo,IBM,Intel Corporation.Trusted mobile platform protocol specification document-Revision1.OO. http://www.trusted-mobile.org . 2004
  • 5TCG MPWG.Mobile trusted module specification overview document.Mobile trusted module specification support documents[]..2006
  • 6.TrustZone Software API Specification[].https://wwwarmcom/pdfs.
  • 7.M-Shield?Mobile SecurityTechnology:making wireless secure[].https://wwwticom/m-shield.2008
  • 8Winter J.Trusted computing building blocks for embedded linux-based arm trustzone platforms[].STC:Proceedings of therd ACM workshop on Scalable trusted computing.2008
  • 9Kurt Dietrich,Johannes Winter.Implementation Aspects of Mobile and Embedded Trusted Computing[].TRUST.2009
  • 10Joe Grand.Practical Secure Hardware Design for Embedded Systems[].Proceedings of the Embedded Systems Conference.2004

同被引文献42

  • 1刘宴兵,刘飞飞.基于云计算的智能手机社交认证系统[J].通信学报,2012,33(S1):28-34. 被引量:7
  • 2吴吉义,沈千里,章剑林,沈忠华,平玲娣.云计算:从云安全到可信云[J].计算机研究与发展,2011,48(S1):229-233. 被引量:54
  • 3中国互联网络信息中心.第31次中国互联网络发展状况统计报告[ R].北京:中国互联网络信息中心,2012.4-5.
  • 4LEE C, LI C, CHANG R. A simple and efficient authentication scheme for mobile satellite communication systems[J]. InternationalJournal of Satellite Communications and Networking, 2012, 30(1): 29-38.
  • 5CHOW R,JAKOBSSON M, MASUOKA R, et al. Authentication in the clouds: a framework and its application to mobile users[A]. Pro?ceedings of the 2010 ACM Workshop on Cloud Computing Security Workshop (CCSW)[C]. Chicago, USA, 2010.1-6.
  • 6YU S, WANG C, REN K, et al. Attribute based data sharing with attribute revocation[A]. Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security (ASIACCS)[C]. Beijing, China, 2010.261-270.
  • 7LIJ, ZHAO G, CHEN X, et al. Fine-grained data access control sys?tems with user accountability in cloud computing[A]. Proceedings of the 2th International Conference on Cloud Computing (CloudCom)[C]. Indianapolis, USA, 2010.89-96.
  • 8ECHEVERRIA V, LIEBROCK L M, SHIN D. Permission manage?ment system: permission as a service in cloud computing[A]. The 34th Annual IEEE Computing Software and Applications Conference Workshops (COMPSAC)[C]. Seoul, South Korea, 2010.371-375.
  • 9UNAL D, CAGLAYAN M U. A formal role-based access control model for security policies in multi-domain mobile networks[J]. Computer Networks, 2013, 57(1): 330-350.
  • 10SHINJ, KIM Y, PARK W, et al. DFCloud: a TPM-based secure data access control method of cloud storage in mobile devices[A]. The 4th IEEE International Conference on Cloud Computing Technology and Science Proceedings (CloudCom)[C]. 2012.

引证文献2

二级引证文献38

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部