期刊文献+

信任链验证与构建系统设计与分析

Design and Analysis on the Trust Chain Verification and Construction System
下载PDF
导出
摘要 信任链构建与验证系统,在虚拟化计算这个新技术的基础上,参照并研究原有可信计算平台信任链的构建与验证,在已有信任链构建过程中和启动过程信任链构建的基础上,虚拟化并实现系统层至应用层的信任链的构建过程,且为应用层的网络通信可信保证及输入输出远程证明这个处于信任链末端的验证部分提供了支撑,包括信任链管道的建立和相关辅助机制的准备,对特权信息的管理,及在底层前后端驱动模型下实现虚拟机间通信机制的驱动支撑。 Employing the new virtualization technology,the trust chain construction and verification system is upgraded on the basis of the original system.The upgraded system virtualizes the construction process of the trust chain from the layer of the system to the application.It supports partly the application-layer Internet application protection and the remote authentication on the end of the trust chain,including the establishment of the trust chain pipe auxiliary machinery and related preparations,the management of permissions,as well as the underlying client-driven model before and after the realization of communication mechanism between virtual machine to support the driver.
作者 朱娟
出处 《福建商业高等专科学校学报》 2012年第2期91-95,共5页 Journal of Fujian Commercial College
关键词 虚拟化技术 网络信任 信任链 Virtualization technology Network trust Chain of trust
  • 相关文献

参考文献6

  • 1S.Berger,R.C?aceres,K.Goldman et al.[C]vtpm:vir-tualizing the trusted platform module.In USENIX Security’06,2006. 被引量:1
  • 2P.Barham,B.Dragovic,K.Fraser et al.[C]Xen and theart of virtualization.In ACM SOSP’03,pages 164–177,2003. 被引量:1
  • 3A.Bussani,J.Gri?n,B.Jansen,et al.[R]Trusted vir-tual domains:Secure foundation for business and it services.Technical report,2005. 被引量:1
  • 4Stefan Berger,Ram?on C?aceres Kenneth et al.[J]vT-PM:Virtualizing the Trusted Platform ModuleIBM T.J.Wat-son Research Cente Hawthorne,NY 10532 USA. 被引量:1
  • 5Weiqi Dai,Hai Jin,Deqing Zou,Shouhuai Xu,WeideZheng,Lei Shi,[C]“TEE:A Virtual DRTM Based Execu-tion Environment for Secure Cloud-End Computing”.Post-er proceedings of the 17th ACM Conference on Computer andCommunications Security(CCS),Hyatt Regency Chicago,IL,USA,OCT 2010. 被引量:1
  • 6D.Challener,K.Yoder,R.Catherman et al.[M]A Prac-tical Guide to Trusted Computing.IBM press,2008. 被引量:1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部