THE TRANSITIVE TRUST IN JAVA']JAVA VIRTUAL MACHINES

被引:0
作者
Shi, Yong [1 ]
Han, Zhen [1 ]
Shen, Chang-Xiang [2 ]
机构
[1] Beijing Jiao tong Univ, Sch Comp & Informat Technol, Beijing 100044, Peoples R China
[2] Bijing Univ Technol, Coll Comp Sci & Technol, Beijing 100022, Peoples R China
来源
PROCEEDINGS OF 2009 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-6 | 2009年
关键词
Trusted computing; Transitive trust; Trusted [!text type='java']java[!/text] platform; !text type='Java']Java[!/text] class loading; Information security;
D O I
10.1109/ICMLC.2009.5212620
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Using root of trust to build Trusted Computing Platforms is a hot spot of information security research nowadays. According to trusted computing, this paper implements transitive trust in Java environment and builds a trusted Java platform. Malicious Java programs are resisted, and Java applications are managed and controlled by a trusted Java platform that only load and run trustworthy Java programs.
引用
收藏
页码:2802 / +
页数:2
相关论文
共 7 条
[1]  
HUANG T, 2004, J WUHAN U, V50, P12
[2]  
LI G, 2003, INSIDE JAVA 2 PLATFO
[3]  
[李晓勇 Li Xiaoyong], 2007, [计算机研究与发展, Journal of Computer Research and Development], V44, P1889, DOI 10.1360/crad20071111
[4]  
Sailer R., 2004, 13 US SEC S SAN DIEG
[5]  
SHENG L, 1998, P 13 ACM SIGPLAN C O, P36
[6]  
*TCG, TCG PC SPEC IMPL SPE
[7]  
*TCG, TCG SPEC ARCH OV VER