A scheme based on trusted computing for terminal security

被引:0
|
作者
Zhang, Jun [1 ]
Liu, Wei-peng [2 ]
Zhou, Zheng [1 ]
Li, Jian [3 ]
机构
[1] Naval Univ Engn, Coll Elect & Informat Engn, Wuhan 430033, Peoples R China
[2] State Key lab Informat Secur GSCAS, Beijing 100049, Peoples R China
[3] PLA Informat Engn Univ, Sch Elect Technol, Zhengzhou 450004, Peoples R China
关键词
trusted computing; terminal; security; privacy;
D O I
10.1109/ISDPE-2007.11
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
According to the current security problems of computer terminal and trusted computing goals proposed by Microsoft Corporation, this paper proposes a solution scheme based on trusted computing for terminal security. By means of formal method, it gives some rules to control user's access to program and data based on its level. Legal programs only can run authorized operation and data file protected by cryptogram based on its level avoiding information leakage. A frame to realize the scheme is also given. And this scheme is described from security and privacy two facets.
引用
收藏
页码:218 / +
页数:2
相关论文
共 50 条
  • [11] Mobile Security and Trusted Computing
    Mitchell, Chris
    [J]. IT-INFORMATION TECHNOLOGY, 2006, 48 (06): : 321 - 326
  • [12] TRUSTED COMPUTING AND INFORMATION SECURITY
    Zhang Huanguo
    Mu Yi
    [J]. CHINA COMMUNICATIONS, 2013, 10 (11) : IX - X
  • [14] TRUSTED COMPUTING AND INFORMATION SECURITY
    张焕国
    MU Yi
    [J]. China Communications, 2013, 10 (11) : 11 - 12
  • [15] Security analysis of personal computers based on trusted computing
    Liu Niansheng
    Li Yongmei
    Ding Yuechao
    Guo Donghui
    [J]. ICCSE'2006: Proceedings of the First International Conference on Computer Science & Education: ADVANCED COMPUTER TECHNOLOGY, NEW EDUCATION, 2006, : 565 - 568
  • [16] Trusted Computing: Security and Applications
    Gallery, Eimear
    Mitchell, Chris J.
    [J]. CRYPTOLOGIA, 2009, 33 (03) : 217 - 245
  • [17] Research on Storage Security Based on Trusted Computing Platform
    He, Jian
    Xu, Mingdi
    [J]. PROCEEDINGS OF THE INTERNATIONAL SYMPOSIUM ON ELECTRONIC COMMERCE AND SECURITY, 2008, : 448 - +
  • [18] A Cloud Computing Security Framework Based on Cloud Security Trusted Authority
    Dawoud, Mohammed M.
    Ebrahim, Gamal A.
    Youssef, Sameh A.
    [J]. INTERNATIONAL CONFERENCE ON INFORMATICS AND SYSTEMS (INFOS 2016), 2016, : 133 - 138
  • [19] Trusted Computing Based Mobile DRM Authentication Scheme
    Yang, Zhen
    Fan, Kefeng
    Lai, Yingxu
    [J]. FIFTH INTERNATIONAL CONFERENCE ON INFORMATION ASSURANCE AND SECURITY, VOL 1, PROCEEDINGS, 2009, : 7 - +
  • [20] Protecting Terminals by Security Domain Mechanism Based on Trusted Computing
    ZHOU Zheng~1
    2. Institute of Electronic Technology
    3. Naval Institute of Computing Technology
    [J]. Wuhan University Journal of Natural Sciences, 2006, (06) : 1437 - 1440