A new approach to multilevel security based on trusted computing platform

被引:0
|
作者
Zuo, Xiao-Dong [1 ]
Liu, Feng-Mei [2 ]
Ma, Chao-Bin [3 ]
机构
[1] Chinese Acad Sci, Grad Sch, State Key Lab Informat Secur, Beijing 100049, Peoples R China
[2] Informat Engn Univ, Coll Informat Engn, Dept Informat Res, Zhengzhou 450002, Peoples R China
[3] Beijing Univ, Coll Comp Sci, Beijing 100022, Peoples R China
关键词
multilevel security; trusted computing; access control; hierarchy;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
To achieve the multilevel security goal some models had been developed such as BLP since 1970s. These models can't successfully work in network environment nowadays due to the difficulty to make the labels of subjects and objects unaltered across different computers. Recent years many researchers put forward cryptographic solutions to address multilevel security problem. But the key management schemes in real systems were always difficult problems that made those solutions unfeasible. The trusted computing technologies are great advancement in computer architecture and should be a powerful tool to securely manage the keys. This paper proposes a new approach on the base of the capabilities provided by TPM (Trusted Platform Module) to implement a sound cryptographic algorithm. The new approach enforces a mandatory access control policy in network environment and is especially suited for classified organizations.
引用
收藏
页码:2158 / +
页数:2
相关论文
共 50 条
  • [2] Research on Storage Security Based on Trusted Computing Platform
    He, Jian
    Xu, Mingdi
    [J]. PROCEEDINGS OF THE INTERNATIONAL SYMPOSIUM ON ELECTRONIC COMMERCE AND SECURITY, 2008, : 448 - +
  • [3] Trusted computing platform based executable code security inspecting model
    Chen, Ze-Mao
    Tang, Wei-Min
    Zhou, Li-Bing
    Liu, Jing-Chao
    Shen, Chang-Xiang
    [J]. Tongxin Xuebao/Journal on Communications, 2007, 28 (SUPPL.): : 112 - 116
  • [4] Security analysis on trust chain of trusted computing platform
    Xu, Ming-Di
    Zhang, Huan-Guo
    Zhao, Heng
    Li, Jun-Lin
    Yan, Fei
    [J]. Jisuanji Xuebao/Chinese Journal of Computers, 2010, 33 (07): : 1165 - 1176
  • [5] Research on trusted storage based on trusted computing platform
    School of Computer, Wuhan University, Wuhan 430072, China
    不详
    [J]. Tongxin Xuebao, 2007, SUPPL. (117-120):
  • [6] Integrity Measurement Enhanced Security for Mobile Agent Based on Trusted Computing Platform
    Wu, Xiaoping
    Zhang, Huanguo
    Shen, Zhidong
    [J]. 2008 4TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-31, 2008, : 4805 - +
  • [7] A new security scheme of trusted mobile platform based on MTM
    Yang, Manzhi
    Zhou, Huixiang
    [J]. ENERGY SCIENCE AND APPLIED TECHNOLOGY, 2016, : 415 - 418
  • [8] Security strategy of DRM based on trusted computing
    Yan, Jianhong
    Peng, Xinguang
    [J]. Journal of Computational Information Systems, 2011, 7 (09): : 3226 - 3234
  • [9] RT Framework Based on Trusted Computing Platform
    Geng, Xiuhua
    Han, Zhen
    Cai, Ying
    [J]. ICSP: 2008 9TH INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING, VOLS 1-5, PROCEEDINGS, 2008, : 2770 - 2773
  • [10] A Distributed Approach towards Trusted Cloud Computing Platform
    Sen, Partha
    Saha, Pritam
    Khatua, Sunirmal
    [J]. INTERNATIONAL CONFERENCE ON 2015 APPLICATIONS AND INNOVATIONS IN MOBILE COMPUTING (AIMOC), 2015, : 146 - 151