期刊文献+
共找到2篇文章
< 1 >
每页显示 20 50 100
Trusted Integrated Circuits: The Problem and Challenges 被引量:5
1
作者 吕勇强 周强 +1 位作者 蔡懿慈 屈钢 《Journal of Computer Science & Technology》 SCIE EI CSCD 2014年第5期918-928,共11页
Hardware security has become more and more important in current information security architecture. Recently collected reports have shown that there may have been considerable hardware attacks prepared for possible mil... Hardware security has become more and more important in current information security architecture. Recently collected reports have shown that there may have been considerable hardware attacks prepared for possible military usage from all over the world. Due to the intrinsic difference from software security, hardware security has some special features and challenges. In order to guarantee hardware security, academia has proposed the concept of trusted integrated circuits,which aims at a secure circulation of IC design, manufacture and chip using. This paper reviews the main problems of trusted integrated circuits, and concludes four key domains of the trusted IC, namely the trusted IC design, trusted manufacture,trusted IP protection, and trusted chip authentication. The main challenges in those domains are also analyzed based on the current known techniques. Finally, the main limitations of the current techniques and possible future trends are discussed. 展开更多
关键词 hardware security trusted integrated circuit hardware Trojan IC authentication IP protection
原文传递
Trusted domain hierarchical model based on noninterference theory
2
作者 Zhang Lei Chen Xingshu +1 位作者 Liu Liang Jin Xin 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 2015年第4期7-16,共10页
To ensure the integrity and security of cloud tenants' workload, and to prevent unexpected interference among tenants, cloud platform must make sure that system behaviors are trusted. By analyzing threats that exist ... To ensure the integrity and security of cloud tenants' workload, and to prevent unexpected interference among tenants, cloud platform must make sure that system behaviors are trusted. By analyzing threats that exist in the cloud platform, a novel trusted domain hierarchical model(TDHM) based on noninterference theory was proposed in this paper to solve these problems. First of all, the abstraction modeling of tenants' computing environment and trusted domain(TD) were introduced for designing TDHM with formal methods. Secondly, corresponding constraints for trusted running were given to satisfy security requirements of tenants' TD, and security properties of TDHM ware analyzed. After that, trusted behavior of TD was defined based on these properties, and the decision theorem of that was proved. It illustrated that the design and implementation of TD in cloud followed the model with characteristics of trusted behavior. Finally, the implementation of prototype system was introduced based on our previous work, and evaluation results showed that the performance loss was in the acceptable range. 展开更多
关键词 trusted domain hierarchical model noninterference theory cloud integrity security trusted domain
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部