期刊文献+

可信计算语义证明模型的研究

Research on Semantic Demonstration Model of Trusted Computing
下载PDF
导出
摘要 针对现有的可信计算平台体系认证技术是静态的、一次性的,并不基于语义等问题,提出了语义远程认证抽象模型,该模型由代码特征化部件、安全监测部件、安全控制部件、应用接口部件、知识库组成。其中关键问题知识库采用离线创建规则的学习模式,供在线检测。 In view of current problems of trusted computing platform system authentication techniques,such as Static,disposable,and not based on the semantics.This paper proposed semantic remote authentication abstract model.This model includes the code characteristics of component,the safety monitoring component,the safety control component and the knowledge base.The knowledge base of the key problem adopts off-line to create rules of the study,for its on-line tests.
出处 《电脑开发与应用》 2010年第8期9-10,12,共3页 Computer Development & Applications
关键词 语义 知识库 结构模型 semantics knowledge base structure model
  • 相关文献

参考文献7

  • 1张焕国,罗捷,金刚,朱智强,余发江,严飞.可信计算研究进展[J].武汉大学学报(理学版),2006,52(5):513-518. 被引量:114
  • 2Trusted ComPuting GrouP (TCG),TPM Main Part 1 Design PrinciPles Specification Versionl [ J ]. 2 revision94,29Match 2006 (4) : 16-26. 被引量:1
  • 3Trusted ComPuting GrouP(TCG),TPM Main Part 2 TPM Structures Specification Versionl [ J ]. 2 revision94,29 Match 2006 (4):65-77. 被引量:1
  • 4王飞,刘毅.可信计算平台管理中心的设计与实现[J].微计算机信息,2007,23(3):91-93. 被引量:8
  • 5Chen L,Landfermann R, Loehr H et al. A Protocol for Property-based Attestation [C]//USA : STC' 06, Alexandria, Viginia, 2006. 被引量:1
  • 6Mousavi, MohammadReza. On the Role of Abstract No-interference in Language-based Security [D]. Department of Computer Science,2005. 被引量:1
  • 7Mousavi, MohammadReza, Towards SOS Meta- Theory for Language-based Security[D]. Department of Computer Science, 2006. 被引量:1

二级参考文献24

  • 1张焕国,毋国庆,覃中平,刘玉珍,刘毅,彭涛,韩永桥.一种新型安全计算机[J].武汉大学学报(理学版),2004,50(A01):1-6. 被引量:21
  • 2张焕国,刘玉珍,余发江,周强,叶新.一种新型嵌入式安全模块[J].武汉大学学报(理学版),2004,50(A01):7-11. 被引量:7
  • 3林闯,彭雪海.可信网络研究[J].计算机学报,2005,28(5):751-758. 被引量:253
  • 4黄力.混合型防火墙的研究与设计[J].微计算机信息,2006,22(03X):34-36. 被引量:4
  • 5[1]TCG.Trusted Computing Group (TCG)Main Specification version 1.1a[EB/OL].http://www.trustedcomputinggroup.org/downloads/tcg spec 1.1b.zip,2001-09. 被引量:1
  • 6[2]Trusted Computing Group.TPM Main Specification:Design Principles v1.2[EB/OL].https://www.trustedcomputinggroup.org.Oct2003. 被引量:1
  • 7[5]Chen You-lei,Shen Chang-xiang.A Security Kernel Architecture Based Trusted Computing Platform[J].Wuhan University Journal of National Sciences.Vol.10,No.1,pages 1-4,Jan 2005. 被引量:1
  • 8Department of Defense Computer Security Center.DoD 5200. 28-STD. Department of Defense Trusted Computer System Evaluation Criteria [S]. USA:DOD, December 1985. 被引量:1
  • 9Trusted Computing Group. TCG Specification Architecture Overview [EB/OL]. [2005-03-01]. https://www.trustedcomputinggroup.org/ groups/ TCG_1_0_Architecture_Overview.pdf. 被引量:1
  • 10Intel Corporation. LaGrande Technology Architectural Overview [EB/OL].[2005-05-01]. http://www.intel.com/technology/security/. 被引量:1

共引文献118

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部