期刊文献+
共找到4篇文章
< 1 >
每页显示 20 50 100
Modeling Trusted Computing 被引量:2
1
作者 CHEN Shuyi WEN Yingyou ZHAO Hong 《Wuhan University Journal of Natural Sciences》 CAS 2006年第6期1507-1510,共4页
In this paper, a formal approach based on predicate logic is proposed for representing and reasoning of trusted computing models. Predicates are defined to represent the characteristics of the objects and the relation... In this paper, a formal approach based on predicate logic is proposed for representing and reasoning of trusted computing models. Predicates are defined to represent the characteristics of the objects and the relationship among these objects in a trusted system according to trusted computing specifications. Inference rules of trusted relation are given too. With the semantics proposed, some trusted computing models are formalized and verified, which shows that Predicate calculus logic provides a general and effective method for modeling and reasoning trusted computing systems. 展开更多
关键词 trusted computing group (TCG) trusted platform module (TPM) trusted computing root of trust predicate logic
下载PDF
Root-Of-Trust for Continuous Integration and Continuous Deployment Pipeline in Cloud Computing
2
作者 Abdul Saboor Mohd Fadzil Hassan +4 位作者 Rehan Akbar Erwin Susanto Syed Nasir Mehmood Shah Muhammad Aadil Siddiqui Saeed Ahmed Magsi 《Computers, Materials & Continua》 SCIE EI 2022年第11期2223-2239,共17页
Cloud computing has gained significant use over the last decade due to its several benefits,including cost savings associated with setup,deployments,delivery,physical resource sharing across virtual machines,and avail... Cloud computing has gained significant use over the last decade due to its several benefits,including cost savings associated with setup,deployments,delivery,physical resource sharing across virtual machines,and availability of on-demand cloud services.However,in addition to usual threats in almost every computing environment,cloud computing has also introduced a set of new threats as consumers share physical resources due to the physical co-location paradigm.Furthermore,since there are a growing number of attacks directed at cloud environments(including dictionary attacks,replay code attacks,denial of service attacks,rootkit attacks,code injection attacks,etc.),customers require additional assurances before adopting cloud services.Moreover,the continuous integration and continuous deployment of the code fragments have made cloud services more prone to security breaches.In this study,the model based on the root of trust for continuous integration and continuous deployment is proposed,instead of only relying on a single signon authentication method that typically uses only id and password.The underlying study opted hardware security module by utilizing the Trusted Platform Module(TPM),which is commonly available as a cryptoprocessor on the motherboards of the personal computers and data center servers.The preliminary proof of concept demonstrated that the TPM features can be utilized through RESTful services to establish the root of trust for continuous integration and continuous deployment pipeline and can additionally be integrated as a secure microservice feature in the cloud computing environment. 展开更多
关键词 root of Trust(RoT) trusted Platform Module(TPM) cryptoprocessor microservices Hardware Security Modules(HSM) DevOps
下载PDF
保护物联网免受黑客攻击的基础
3
作者 郭正伟 《中国集成电路》 2021年第11期18-23,30,共7页
随着连接到物联网(IoT)的设备数量不断增加,对这些设备的强大安全解决方案的需求持续增加。物联网的安全性绝不应是事后考虑,原因在于产品被破坏会导致高达数千万美元的巨额损失和责任索赔。您可以提前支付安全费用或稍后支付巨额赔偿金... 随着连接到物联网(IoT)的设备数量不断增加,对这些设备的强大安全解决方案的需求持续增加。物联网的安全性绝不应是事后考虑,原因在于产品被破坏会导致高达数千万美元的巨额损失和责任索赔。您可以提前支付安全费用或稍后支付巨额赔偿金,但这永远不会是免费的。本文主要内容:一是阐述了通过查看需要保护的互联设备的最基本资产来解决安全需求:保护数据和对网络上的设备彼此进行身份验证所需的密钥和标识。这些敏感资产是任何安全架构的核心,需要保护其免受攻击者的攻击,以确保设备安全。二是介绍了需要这些资产的场景,从芯片供应商和设备制造商的角度思考,并比较了保护这些重要资产的不同方法。三是除了介绍存储敏感信息的传统方法外,还额外介绍了一种基于物理不可克隆函数(PUF)的方法。它显示了PUF的性能如何优于传统方法,特别是在将物联网有效扩展到数十亿设备的背景下、并从芯片和设备制造商的角度进行了分析。 展开更多
关键词 信任根(root of Trust) PUF(Physical Unclonable Function) SRAMPUF 非易失性存储器(NVM) 根密钥 安全芯片(SE)
下载PDF
vCerberus:A DRTM System Based on Virtualization Technology
4
作者 CHEN Wenzhi ZHANG Zhipeng YANG Jianhua HE Qinming 《Wuhan University Journal of Natural Sciences》 CAS 2010年第3期185-189,共5页
This paper presents vCerberus, a novel hypervisor to provide trusted and isolated code execution within virtual domains vCerberus is considerably tiny, while allowing secure sensitive codes to be executed in an isolat... This paper presents vCerberus, a novel hypervisor to provide trusted and isolated code execution within virtual domains vCerberus is considerably tiny, while allowing secure sensitive codes to be executed in an isolated circumstance from the virtual ddmain, and can be attested by a remote party in an efficient way. These properties will be guaranteed even if the guest operating system is malicious. This protects the secure sensitive codes against the malicious codes in the Guest OS, e.g., the kernel rootkits. We present an approach to dynamically measure and isolate the launch environment on the virtual machines based on the para-virtualization technology and a novel virtualization of trusted platform module (TPM). Our performance experiment result shows that the overhead introduced by vCerberus is minimized; the performance of the launch environment in vCerberus is as competitive as the guest OS running on mainstream hypervisors. 展开更多
关键词 trusted computing para-virtualization dynamic root of trust for measurement (DRTM) trusted platform module (TPM)
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部