首页 | 本学科首页   官方微博 | 高级检索  
     

基于可信计算平台的静态客体可信验证系统的设计与实现
引用本文:谭良,周明天.基于可信计算平台的静态客体可信验证系统的设计与实现[J].计算机科学,2008,35(2):253-255.
作者姓名:谭良  周明天
作者单位:1. 四川师范大学四川省软件重点实验室,成都,610066;电子科技大学计算机科学与工程学院,成都,610054
2. 电子科技大学计算机科学与工程学院,成都,610054
基金项目:国家新技术研究发展基金(863计划) , 四川省科技攻关项目
摘    要:在安全操作系统中,通常采用了多种访问控制模型来保证静态客体的内容的机密性和完整性.但是,传统的访问控制政策不能保证静态客体内容的真实性.因此,安全操作系统中的客体并不可信.本文首先分析了操作系统中客体的类型,总结了安全操作系统中对静态客体的处理存在的问题,提出可信静态客体的概念并分析其特点.为了保证可信静态客体内容的真实性,提出了基于TPM的静态客体可信验证系统.该系统将生成可信静态客体的映像文件,映像文件记录某可信静态客体的来源、各次处理行为和内容变化的签名并存于TPM中.最后对该可信验证系统进行了安全和性能分析.分析表明,该可信验证系统可以保证可信静态客体内容的真实性,为进一步建立可信计算环境提供了基础.

关 键 词:安全操作系统  客体  可信操作系统  可信静态客体  可信动态客体  可信客体  可信计算平台

Design and Implementation of the Trusted Authentication System for the Static Object Based on the TPM
TAN Liang,ZHOU Ming-Tian.Design and Implementation of the Trusted Authentication System for the Static Object Based on the TPM[J].Computer Science,2008,35(2):253-255.
Authors:TAN Liang  ZHOU Ming-Tian
Abstract:Generally,the security operating system makes use of the multi-mixed access control policies to guarantee the confidentiality and integrity of the static object,but the traditional access control policies still have some deficiencies in accessing the object,and can't guarantee the authenticity of the object.So the object in the security operating system isn't trustworthy.In this paper,the object types in the operating system,which are sorted into the static object and the dynamic object,are analyzed,and some problems for accessing the object in the security operating system are pointed out.Based on that,the conception of the trusted static object,the trusted dynamic object and the trusted object is put forward,and the characters of the trusted object,the relationship between the secure object and the trusted object are addressed.Finally,some requirements for the trusted object,which need to be resolve in the trusted operating system,are presented and discussed.All of these are the foundation for our future works.
Keywords:Security operating system  Object  Trusted operating system  Trusted static object  Trusted dynamic object  Trusted object  TPM
本文献已被 CNKI 维普 万方数据 等数据库收录!
点击此处可从《计算机科学》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号