• 综合
  • 标题
  • 关键词
  • 摘要
  • 学者
  • 期刊-刊名
  • 期刊-ISSN
  • 会议名称
搜索

作者:

Zhao, Jia (Zhao, Jia.) | Shen, Changxiang (Shen, Changxiang.) | Liu, Jiqiang (Liu, Jiqiang.) | Han, Zhen (Han, Zhen.)

收录:

EI Scopus PKU CSCD

摘要:

The traditional information security systems, such as firewall, intrusion detection and anti-virus, are all preventing attacks from the outside. But these methods can't meet the various security requirements. Therefore, experts appeal to solve the problems from the inner. Under this background, TCG proposed the conception of trusted computing. It aims to improve the security on the terminals. At present, trusted computing and its related researches are the focus and trend of information security in inland and oversea. Trusted computing is the foundation of the security, and it may solve the insecure problem caused by the platform of hardware in PC. Trust chain starts from the trust root. TCG introduces the idea of the trusted into the computing environment, but there is still not the formalized uniform description. Trusted computing is still a technology but not a theory, and the basic theory model has not been established. Noninterference theory is introduced into the domain of trusted computing to construct the trusted chain theoretic model. The basic theory of the computing trusted is proposed and a noninterference-based trusted chain model is built from the dynamic point of view, and then the model is formalized and verified. Finally, the process of start up based on Linux operating system kernel is implemented. The implementation provides a good reference for the development and application of the trusted computing theory as well.

关键词:

Computation theory Computer operating systems Computer system firewalls Computer viruses Intrusion detection Trusted computing Viruses

作者机构:

  • [ 1 ] [Zhao, Jia]School of Computer and Information Technology, Beijing Jiaotong University, Beijing 100044, China
  • [ 2 ] [Shen, Changxiang]School of Computer and Information Technology, Beijing Jiaotong University, Beijing 100044, China
  • [ 3 ] [Shen, Changxiang]College of Computer Science and Technology, Beijing University of Technology, Beijing 100022, China
  • [ 4 ] [Liu, Jiqiang]School of Computer and Information Technology, Beijing Jiaotong University, Beijing 100044, China
  • [ 5 ] [Han, Zhen]School of Computer and Information Technology, Beijing Jiaotong University, Beijing 100044, China

通讯作者信息:

电子邮件地址:

查看成果更多字段

相关关键词:

相关文章:

来源 :

Computer Research and Development

ISSN: 1000-1239

年份: 2008

期: 6

卷: 45

页码: 974-980

被引次数:

WoS核心集被引频次: 0

SCOPUS被引频次:

ESI高被引论文在榜: 0 展开所有

万方被引频次:

中文被引频次:

近30日浏览量: 2

在线人数/总访问数:2040/2980171
地址:北京工业大学图书馆(北京市朝阳区平乐园100号 邮编:100124) 联系我们:010-67392185
版权所有:北京工业大学图书馆 站点建设与维护:北京爱琴海乐之技术有限公司