A scheme based on trusted computing for terminal security

被引:0
|
作者
Zhang, Jun [1 ]
Liu, Wei-peng [2 ]
Zhou, Zheng [1 ]
Li, Jian [3 ]
机构
[1] Naval Univ Engn, Coll Elect & Informat Engn, Wuhan 430033, Peoples R China
[2] State Key lab Informat Secur GSCAS, Beijing 100049, Peoples R China
[3] PLA Informat Engn Univ, Sch Elect Technol, Zhengzhou 450004, Peoples R China
关键词
trusted computing; terminal; security; privacy;
D O I
10.1109/ISDPE-2007.11
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
According to the current security problems of computer terminal and trusted computing goals proposed by Microsoft Corporation, this paper proposes a solution scheme based on trusted computing for terminal security. By means of formal method, it gives some rules to control user's access to program and data based on its level. Legal programs only can run authorized operation and data file protected by cryptogram based on its level avoiding information leakage. A frame to realize the scheme is also given. And this scheme is described from security and privacy two facets.
引用
收藏
页码:218 / +
页数:2
相关论文
共 50 条
  • [1] Based on Trusted Computing Solutions for Mobile Payment Terminal Security
    Yu, Haiyong
    Li, Peng
    [J]. NINTH WUHAN INTERNATIONAL CONFERENCE ON E-BUSINESS, VOLS I-III, 2010, : 570 - 574
  • [2] Research on Smart Mobile Terminal Security Technology Based on Trusted Computing
    Li, Ming
    Fang, Yuan
    Liu, Jun
    [J]. AGRO FOOD INDUSTRY HI-TECH, 2017, 28 (01): : 3278 - 3281
  • [3] An enhanced scheme of enforcing DTE security policy based on trusted computing technology
    Liu, Wei-Peng
    Zuo, Xiao-Dong
    Huang, Qiang
    [J]. PROCEEDINGS OF 2008 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-7, 2008, : 3657 - +
  • [4] Security Access of Power terminal on Trusted Computing in Smart Grid
    Deng Song
    Lin Wei-min
    Zhang Tao
    Ma Yuan-yuan
    [J]. INDUSTRIAL INSTRUMENTATION AND CONTROL SYSTEMS, PTS 1-4, 2013, 241-244 : 2659 - 2664
  • [5] WLAN Mesh security association scheme in trusted computing environment
    Xiao, Yue-Lei
    Wang, Yu-Min
    Pang, Liao-Jun
    Tan, Shi-Chong
    [J]. Tongxin Xuebao/Journal on Communications, 2014, 35 (07): : 94 - 103
  • [6] Security strategy of DRM based on trusted computing
    Yan, Jianhong
    Peng, Xinguang
    [J]. Journal of Computational Information Systems, 2011, 7 (09): : 3226 - 3234
  • [7] A Signature Scheme Based Trusted Computing Plat
    Jiao, Hongqiang
    Zhang, Yanjun
    Li, Hui
    [J]. MINES 2009: FIRST INTERNATIONAL CONFERENCE ON MULTIMEDIA INFORMATION NETWORKING AND SECURITY, VOL 1, PROCEEDINGS, 2009, : 356 - 359
  • [8] Password management scheme based on trusted computing
    National Engineering Laboratory for Disaster Backup and Recovery, Beijing University of Posts and Telecommunications, Beijing 100876, China
    [J]. Beijing Youdian Daxue Xuebao, 2008, 5 (93-97):
  • [9] Security analysis and improvement of a mutual authentication scheme under trusted computing
    Bin Muhaya, Fahad T.
    [J]. INTERNATIONAL JOURNAL OF AD HOC AND UBIQUITOUS COMPUTING, 2015, 18 (1-2) : 37 - 44
  • [10] Content Protection based on Trusted computing in Mobile Terminal
    Liu Ren
    Niu Dongxiao
    [J]. 2009 INTERNATIONAL CONFERENCE ON INFORMATION MANAGEMENT, INNOVATION MANAGEMENT AND INDUSTRIAL ENGINEERING, VOL 2, PROCEEDINGS, 2009, : 192 - 195