首页 | 本学科首页   官方微博 | 高级检索  
     

可信系统信任链研究综述
引用本文:徐明迪,张焕国,张帆,杨连嘉.可信系统信任链研究综述[J].电子学报,2014,42(10):2024-2031.
作者姓名:徐明迪  张焕国  张帆  杨连嘉
作者单位:1. 武汉数字工程研究所, 湖北武汉 430205; 2. 空天信息安全与可信计算教育部重点实验室, 湖北武汉 430072; 3. 杭州电子科技大学通信工程学院, 浙江杭州 310018
基金项目:国防预研基金(No .9140A15040211CB3901);国家自然科学基金(No .61003268);浙江省教育厅基金
摘    要:信任链是实施可信系统的关键技术之一,本文从信任链理论和应用系统出发,介绍了研究信任链理论的典型模型及近年来的研究进展,包括基于无干扰理论的信任链传递模型和基于组合安全理论的信任链模型,详细阐述了这两种信任链理论模型的优势和不足.介绍了基于静态信任根和动态信任根的信任链应用系统的研究状况,介绍了信任链远程证明技术,介绍了云计算环境下的信任链应用系统,对信任链应用系统存在的安全缺陷以及一致性和安全性测评方法进行了分析论述,并展望了该领域未来的发展趋势.

关 键 词:可信计算  信任链理论  无干扰理论  组合安全理论  静态信任链  动态信任链  信任链应用系统安全  
收稿时间:2013-07-25

Survey on Chain of Trust of Trusted System
XU Ming-di,ZHANG Huan-guo,ZHANG Fan,YANG Lian-jia.Survey on Chain of Trust of Trusted System[J].Acta Electronica Sinica,2014,42(10):2024-2031.
Authors:XU Ming-di  ZHANG Huan-guo  ZHANG Fan  YANG Lian-jia
Affiliation:1. Wuhan Digital and Engineering Institute, Wuhan, Hubei 430205, China; 2. The Key Laboratory of Aerospace Information Security and Trust Computing, Ministry of Education, Wuhan, Hubei 430072, China; 3. Communication Engineering School, Hanzhou Dianzi University, Hangzhou, Zhejiang 310018, China
Abstract:Chain of trust (CoT) is one of the key technologies for constructing trusted system.As viewed from theories and application systems of CoT, this paper introduced several representative models and the latest investigations including noninterference-based CoT theory and composition security-based CoT theory firstly.Afterward, this paper expatiated advantage and shortage of two CoT theories in detail.Secondly, this paper introduced the development of application systems comprising static CoT and dynamic CoT, and analyzed the remote attestation technology of chain of trust, and presented the CoT systems in cloud computing environment, and analyzed the security deficiency of those systems, and then discussed the conformance testing and security evaluation for CoT application system.Finally, this paper put forward the research and development trend for CoT.
Keywords:trusted computing  theory of CoT (chain of trust)  noninterference theory  composition security theory  static CoT  dynamic CoT  security of CoT application systems
点击此处可从《电子学报》浏览原始摘要信息
点击此处可从《电子学报》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号