An Efficient Security Architecture for Trusted Computing

被引:1
作者
Yin Zhixi [1 ]
机构
[1] N Univ China, Coll Sci, Taiyuan Shanxi 030051, Peoples R China
来源
2009 2ND IEEE INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY, VOL 4 | 2009年
关键词
trusted computing; security architecture; virtual machine monitor;
D O I
10.1109/ICCSIT.2009.5234493
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We argued that virtual machine monitor (VMM) is the appropriate architecture for implementing TCG specification With analysis of limitations Trusted Computing Group (TCG) has encountered. Putting together the VMM architecture, TCG hardware and application-oriented "thin" virtual machine (VM), Trusted VMM-based security architecture is present in this paper with the character of reduced and distributed trusted computing base (TCB). It provides isolation and integrity guarantees based on which general security requirements can be satisfied.
引用
收藏
页码:599 / 601
页数:3
相关论文
共 11 条
[1]   Some weaknesses of the TCB model [J].
Blakley, B ;
Kienzle, DM .
1997 IEEE SYMPOSIUM ON SECURITY AND PRIVACY - PROCEEDINGS, 1997, :3-5
[2]  
BORHAM R, 2003, P 19 ACM S OP SYST P, P164
[3]  
MICHAEL H, 2006, TCB SIZE USING UNTRU
[4]  
*MICR, 2006, MOD NEXT GEN SEC COM
[5]  
PAUL A, 2005, COMP SEC APPL C 21 A, P267
[6]  
PAUL A, 1990, P IEEE S RES SEC PRI, P2
[7]  
REFINER S, 2005, MAC BASED SECURITY A
[8]  
REFINER S, 2004, P 13 US SEC S SAN DI, P223
[9]  
RICH U, 2005, COMPUTER, V38, P48
[10]  
TAL G, 2003, SOSP03, P193