A Security Kernel Architecture Based Trusted Computing Platform

被引:4
|
作者
CHEN You-lei
机构
关键词
trusted computing; TCB module; security kernel; trusted mechanism;
D O I
暂无
中图分类号
TP309 [安全保密];
学科分类号
081201 ; 0839 ; 1402 ;
摘要
A security kernel architecture built on trusted computing platform in the light of thinking about trusted computing is presented. According to this architecture, a new security module TCB (Trusted Computing Base) is added to the operation system kernel and two operation interface modes are provided for the sake of self-protection. The security kernel is divided into two parts and trusted mechanism is separated from security functionality. The TCB module implements the trusted mechanism such as measurement and attestation, while the other components of security kernel provide security functionality based on these mechanisms. This architecture takes full advantage of functions provided by trusted platform and clearly defines the security perimeter of TCB so as to assure self-security from architectural vision. We also present function description of TCB and discuss the strengths and limitations comparing with other related researches.
引用
收藏
页码:1 / 4
页数:4
相关论文
共 50 条
  • [1] Research on Storage Security Based on Trusted Computing Platform
    He, Jian
    Xu, Mingdi
    [J]. PROCEEDINGS OF THE INTERNATIONAL SYMPOSIUM ON ELECTRONIC COMMERCE AND SECURITY, 2008, : 448 - +
  • [2] An Efficient Security Architecture for Trusted Computing
    Yin Zhixi
    [J]. 2009 2ND IEEE INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY, VOL 4, 2009, : 599 - 601
  • [3] A new approach to multilevel security based on trusted computing platform
    Zuo, Xiao-Dong
    Liu, Feng-Mei
    Ma, Chao-Bin
    [J]. PROCEEDINGS OF 2007 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-7, 2007, : 2158 - +
  • [4] Security Architecture of Trusted Virtual Machine Monitor for Trusted Computing
    HUANG Qiang1
    2. Naval Institute of Computing Technology
    3. College of Information Technical Science
    [J]. Wuhan University Journal of Natural Sciences, 2007, (01) : 13 - 16
  • [5] Integrity Measurement Enhanced Security for Mobile Agent Based on Trusted Computing Platform
    Wu, Xiaoping
    Zhang, Huanguo
    Shen, Zhidong
    [J]. 2008 4TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-31, 2008, : 4805 - +
  • [6] IaaS Architecture based on Trusted Computing
    Zhang Wenbo
    Bao Zhenshan
    Li Jian
    Duan Lijuan
    [J]. APPLIED SCIENCE, MATERIALS SCIENCE AND INFORMATION TECHNOLOGIES IN INDUSTRY, 2014, 513-517 : 399 - 402
  • [7] Trusted computing-based security architecture for 4G mobile networks
    Zheng, Y
    He, DK
    Yu, WC
    Tang, XH
    [J]. PDCAT 2005: SIXTH INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED COMPUTING, APPLICATIONS AND TECHNOLOGIES, PROCEEDINGS, 2005, : 251 - 255
  • [8] RT Framework Based on Trusted Computing Platform
    Geng, Xiuhua
    Han, Zhen
    Cai, Ying
    [J]. ICSP: 2008 9TH INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING, VOLS 1-5, PROCEEDINGS, 2008, : 2770 - 2773
  • [9] A scheme based on trusted computing for terminal security
    Zhang, Jun
    Liu, Wei-peng
    Zhou, Zheng
    Li, Jian
    [J]. PROCEEDINGS OF THE FIRST INTERNATIONAL SYMPOSIUM ON DATA, PRIVACY, AND E-COMMERCE, 2007, : 218 - +
  • [10] A Security Technology for Mobile Agent System Improved by Trusted Computing Platform
    Shen, Zhidong
    Tong, Qiang
    [J]. HIS 2009: 2009 NINTH INTERNATIONAL CONFERENCE ON HYBRID INTELLIGENT SYSTEMS, VOL 3, PROCEEDINGS, 2009, : 46 - +