期刊文献+

一种并行可复原可信启动过程的设计与实现 被引量:2

Design and Implementation of a Parallel Recovery Trusted Startup Process Based on the Trusted Platform Module
下载PDF
导出
摘要 操作系统可信性的建立是从整个计算机系统加电引导开始直至操作系统运行环境最终的创建,对任意一可能降低操作系统可信性的执行代码操作都要进行一致性度量。本文基于可信计算联盟的规范,分析了基于T■的可信引导过程,提出了一种新的可信引导过程:并行可复原可信引导过程一在主机CPU与TPM之间采用并行作方式,并支持被验证组件代码的备份和恢复。然后利用通道技术设计和实现了这一引导过程。最后对该引导过进行了安全和性能分析,分析表明该引导过程可以使计算机获得更高的安全保障,为进一步建立可信计算环境提供基础。 For establishing the trustworthiness of the operating system, every program code of the operating system, which possibly reduces the trustworthiness,must be attest the integrality during the whole process form firstly switching on power to finally establishing the running environment in the computer system. According to the standards of the trusted computing group, based on the analysis to the trusted startup process of the common operator system, a trusted boot process, called a Parallel Recovery Trusted Startup Process (PRTSP), which takes a parallel working between CPU and TPM, and supports backup and recovery, has been put forward, and then designed and implemented by channel technology. Finally, we discuss the security and performance of the PRTSP. Based on the PRTSP, high assurance of system security has been gained, thus the basis for building the trusted computing environment has been provided.
作者 谭良 周明天
出处 《计算机科学》 CSCD 北大核心 2007年第10期284-289,共6页 Computer Science
基金 国家863宽带VPN项目863-104-03-01课题资助 2003年度四川省科技攻关项目03GG007-007支持
关键词 可信计算 可信平台模块 完整性度量 Trusted computing, Trusted platform module (TPM), Attestation of integrity
  • 相关文献

参考文献20

二级参考文献104

  • 1黄涛,沈昌祥.一种基于可信服务器的可信引导方案[J].武汉大学学报(理学版),2004,50(A01):12-14. 被引量:19
  • 2林闯,任丰原.可控可信可扩展的新一代互联网[J].软件学报,2004,15(12):1815-1821. 被引量:79
  • 3.中国互联网发展状况统计[EB/OL].http://www.cnnic.net.cn,. 被引量:4
  • 4S Micali.Efficient Certificate Revocation[M].Cambridge,MA,USA:Massachusetts Institute of Technology,1996.542-563. 被引量:1
  • 5Paul C Kochar.On certificate revocation and validation[A].Proceedings of the Second International Conference on Financial Cryptography[C].Berlin:Springer-Verlag,1998.171-177. 被引量:1
  • 6Moni,Naor,Kobbi,Nissim.Certificate revocation and certificate update[J].IEEE Journal on Selected Areasin Communications,2000,18(1):561-170. 被引量:1
  • 7Hously R,Ford W,Polk W,et al.Internet X.509 publickey infrastructure certificate and CRL profile[S].IETF RFC2459,1999,http://www.ietf.org/rfc/rfc2459.html. 被引量:1
  • 8André (A)rnes,Mike Just,Svein J,et al.Selecting revocation solutions for PKI[A].Proceedings of The Fifth Nordic Workshop on Secure IT Systems (NORDSEC 2000)[C].Reykjavik,Iceland,2000.360-376. 被引量:1
  • 9Cooper A Cooper.A more efficient use of Delta-CRLs[A].The Proceedings of the 2000 IEEE Symposium on Security and Privacy[C].Berkeley,2000.190-202. 被引量:1
  • 10David A Cooper.A model of certificate revoction[A].The Proceedings of Fifteenth Annual Comperter Security Application Conference[C].Phoenix,1999.256-264. 被引量:1

共引文献350

同被引文献21

引证文献2

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部