A Security Kernel Architecture Based Trusted Computing Platform

被引:4
|
作者
CHEN You-lei
机构
关键词
trusted computing; TCB module; security kernel; trusted mechanism;
D O I
暂无
中图分类号
TP309 [安全保密];
学科分类号
081201 ; 0839 ; 1402 ;
摘要
A security kernel architecture built on trusted computing platform in the light of thinking about trusted computing is presented. According to this architecture, a new security module TCB (Trusted Computing Base) is added to the operation system kernel and two operation interface modes are provided for the sake of self-protection. The security kernel is divided into two parts and trusted mechanism is separated from security functionality. The TCB module implements the trusted mechanism such as measurement and attestation, while the other components of security kernel provide security functionality based on these mechanisms. This architecture takes full advantage of functions provided by trusted platform and clearly defines the security perimeter of TCB so as to assure self-security from architectural vision. We also present function description of TCB and discuss the strengths and limitations comparing with other related researches.
引用
收藏
页码:1 / 4
页数:4
相关论文
共 50 条
  • [31] An Improved Scheme of μTESLA Authentication based Trusted Computing Platform
    Du, Ruiying
    Wen, Song
    2008 4TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-31, 2008, : 4711 - 4714
  • [32] A User Authentication Scheme Based on Trusted Platform for Cloud Computing
    Mo, Jiaqing
    Hu, Zhongwang
    Lin, Yuhua
    SECURITY, PRIVACY, AND ANONYMITY IN COMPUTATION, COMMUNICATION, AND STORAGE, 2016, 10066 : 122 - 130
  • [33] Research and application of trusted computing platform based on portable TPM
    Fang, Weiwei
    Zhou, Changsheng
    Zhang, Ying
    Zhang, Liang
    2009 2ND IEEE INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY, VOL 2, 2009, : 506 - 509
  • [34] Protecting Terminals by Security Domain Mechanism Based on Trusted Computing
    ZHOU Zheng~1
    2. Institute of Electronic Technology
    3. Naval Institute of Computing Technology
    Wuhan University Journal of Natural Sciences, 2006, (06) : 1437 - 1440
  • [35] WEB SERVICE SYSTEM STRUCTURE BASED ON TRUSTED COMPUTING PLATFORM
    Xu, Feng
    Ma, Hongxu
    INTELLIGENT AUTOMATION AND SOFT COMPUTING, 2013, 19 (02): : 175 - 184
  • [36] A document protection solution in mobile platform based on trusted computing
    Yu, Xiaojun
    Wen, Qiaoyan
    Yan, Tao
    2ND INTERNATIONAL SYMPOSIUM ON COMPUTER NETWORK AND MULTIMEDIA TECHNOLOGY (CNMT 2010), VOLS 1 AND 2, 2010, : 251 - 255
  • [37] Sharing model for trusted computing platform
    Zhang, Qin
    Chen, Chunrun
    Qiang, Weizhong
    Liu, Yingshu
    Huazhong Keji Daxue Xuebao (Ziran Kexue Ban)/Journal of Huazhong University of Science and Technology (Natural Science Edition), 2007, 35 (12): : 5 - 8
  • [38] Research and Design of Trusted Computing Platform
    Zhou Yun-ting
    Deng Mao-lin
    Chong Yu-hai
    Ji Feng-zhu
    He Xiao-gang
    Tang Qi-jie
    PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON ADVANCES IN MECHANICAL ENGINEERING AND INDUSTRIAL INFORMATICS (AMEII 2016), 2016, 73 : 1183 - 1188
  • [39] Research on Gateway Security Isolation Technology based on Trusted Computing
    Mao, Jiangkun
    Xu, Yufeng
    ADVANCES IN MECHATRONICS, AUTOMATION AND APPLIED INFORMATION TECHNOLOGIES, PTS 1 AND 2, 2014, 846-847 : 1656 - 1659
  • [40] A mobile and portable trusted computing platform
    Surya Nepal
    John Zic
    Dongxi Liu
    Julian Jang
    EURASIP Journal on Wireless Communications and Networking, 2011