A Security Kernel Architecture Based Trusted Computing Platform

被引:4
|
作者
CHEN You-lei
机构
关键词
trusted computing; TCB module; security kernel; trusted mechanism;
D O I
暂无
中图分类号
TP309 [安全保密];
学科分类号
081201 ; 0839 ; 1402 ;
摘要
A security kernel architecture built on trusted computing platform in the light of thinking about trusted computing is presented. According to this architecture, a new security module TCB (Trusted Computing Base) is added to the operation system kernel and two operation interface modes are provided for the sake of self-protection. The security kernel is divided into two parts and trusted mechanism is separated from security functionality. The TCB module implements the trusted mechanism such as measurement and attestation, while the other components of security kernel provide security functionality based on these mechanisms. This architecture takes full advantage of functions provided by trusted platform and clearly defines the security perimeter of TCB so as to assure self-security from architectural vision. We also present function description of TCB and discuss the strengths and limitations comparing with other related researches.
引用
收藏
页码:1 / 4
页数:4
相关论文
共 50 条
  • [1] Research on Storage Security Based on Trusted Computing Platform
    He, Jian
    Xu, Mingdi
    PROCEEDINGS OF THE INTERNATIONAL SYMPOSIUM ON ELECTRONIC COMMERCE AND SECURITY, 2008, : 448 - +
  • [2] An Efficient Security Architecture for Trusted Computing
    Yin Zhixi
    2009 2ND IEEE INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY, VOL 4, 2009, : 599 - 601
  • [3] A new approach to multilevel security based on trusted computing platform
    Zuo, Xiao-Dong
    Liu, Feng-Mei
    Ma, Chao-Bin
    PROCEEDINGS OF 2007 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-7, 2007, : 2158 - +
  • [4] Security Architecture of Trusted Virtual Machine Monitor for Trusted Computing
    HUANG Qiang1
    2. Naval Institute of Computing Technology
    3. College of Information Technical Science
    WuhanUniversityJournalofNaturalSciences, 2007, (01) : 13 - 16
  • [5] Trusted computing platform based executable code security inspecting model
    Chen, Ze-Mao
    Tang, Wei-Min
    Zhou, Li-Bing
    Liu, Jing-Chao
    Shen, Chang-Xiang
    Tongxin Xuebao/Journal on Communications, 2007, 28 (SUPPL.): : 112 - 116
  • [6] Security analysis on trust chain of trusted computing platform
    Xu M.-D.
    Zhang H.-G.
    Zhao H.
    Li J.-L.
    Yan F.
    Jisuanji Xuebao/Chinese Journal of Computers, 2010, 33 (07): : 1165 - 1176
  • [7] Research on trusted storage based on trusted computing platform
    School of Computer, Wuhan University, Wuhan 430072, China
    不详
    Tongxin Xuebao, 2007, SUPPL. (117-120):
  • [8] Integrity Measurement Enhanced Security for Mobile Agent Based on Trusted Computing Platform
    Wu, Xiaoping
    Zhang, Huanguo
    Shen, Zhidong
    2008 4TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-31, 2008, : 4805 - +
  • [9] IaaS Architecture based on Trusted Computing
    Zhang Wenbo
    Bao Zhenshan
    Li Jian
    Duan Lijuan
    APPLIED SCIENCE, MATERIALS SCIENCE AND INFORMATION TECHNOLOGIES IN INDUSTRY, 2014, 513-517 : 399 - 402
  • [10] Trusted computing-based security architecture for 4G mobile networks
    Zheng, Y
    He, DK
    Yu, WC
    Tang, XH
    PDCAT 2005: SIXTH INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED COMPUTING, APPLICATIONS AND TECHNOLOGIES, PROCEEDINGS, 2005, : 251 - 255