首页 | 本学科首页   官方微博 | 高级检索  
     

基于虚拟机的可信计算
引用本文:韩春林,舒斌.基于虚拟机的可信计算[J].信息安全与通信保密,2010(7):81-83.
作者姓名:韩春林  舒斌
作者单位:成都三零盛安信息系统有限公司,四川,成都,610041
摘    要:当前,虚拟机技术和可信计算技术是两大热门技术,可信计算技术是实现信息系统安全的重要手段。是否可以在虚拟机的环境下,通过结合虚拟机和可信计算的技术优势,来实现终端系统与网络的可信,提高整个信息系统的安全?研究了如何设计一个基于虚拟机的可信计算平台安全架构,并进一步研究了虚拟化TPM的问题。同时,分析并总结了TCG定义的可信链技术。在此基础上,提出了虚拟机环境下可信链的实现方法,加强终端系统与网络的安全性。

关 键 词:虚拟机  可信计算  可信平台  可信链

Trusted Computing Based on Virtual Machine
HAN Chun-lin,SHU Bin.Trusted Computing Based on Virtual Machine[J].China Information Security,2010(7):81-83.
Authors:HAN Chun-lin  SHU Bin
Affiliation:(Chengdu 30san Information System Co.,Ltd.,Chengdu Sichuan 610041,China)
Abstract:Nowadays,the virtual machine technology and the trusted computing technology have become the two popular technologies. The trusted computing technology is an important means for achieving information system security. Is it possible to realize the trusted of terminal system and network by combining the technical superiorities of virtual machine and trusted computing in a virtual machine environment,and thus to enhance the security of the whole information system? A security framework for trusted computing platform based on virtual machine is studied and designed,and also the TPM issue in the virtual environment is discussed. Meanwhile,based on analysis and summary of the trusted chain technology defined by TCG,an implementation method for the trusted chain in the virtual machine environment is proposed,thus to strengthen the security of the terminal system and network.
Keywords:virtual machine  trusted computing  trusted computing platform(TCP)  trusted chain
本文献已被 维普 万方数据 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号