首页 | 官方网站   微博 | 高级检索  
     

可信管道模型研究
引用本文:李勇,李光,沈昌祥.可信管道模型研究[J].计算机工程与应用,2011,47(26):70-73.
作者姓名:李勇  李光  沈昌祥
作者单位:1.解放军信息工程大学 电子技术学院,郑州 4500042.华北计算技术研究所,北京 1000833.北京工业大学 计算机学院,北京 100022
基金项目:国家高技术研究发展计划(863)No.2009AA01Z437~~
摘    要:针对可信计算基(TCB)可信扩展过程中涉及的隔离问题,提出了可信管道模型。对可信管道进行了形式化描述,给出了构成元素、建立规则和传输规则;分析了基本属性,证明了可信管道支撑下的TCB可信扩展符合非传递无干扰模型;分析了可信管道模型的安全性;给出了一个可信管道的实施框架。

关 键 词:可信计算  可信计算基  可信管道  无干扰  
修稿时间: 

Research of trusted channel model
LI Yong,LI Guang,SHEN Changxiang.Research of trusted channel model[J].Computer Engineering and Applications,2011,47(26):70-73.
Authors:LI Yong  LI Guang  SHEN Changxiang
Affiliation:1.Institute of Electronic Technology,PLA Information Engineering University,Zhengzhou 450004,China2.North China Institute of Computing Technology,Beijing 100083,China3.Institute of Computer,Beijing University of Technology,Beijing 100022,China
Abstract:According to the problem of space isolating in the process of Trusted Computing Base(TCB) trusted expanding,a trusted channel model is proposed.The components of the trusted channel and two rules which are the rule of making trusted channel and the rule of transporting data are formally described.The secure property of trusted channel is analyzed.At last the trusted channel is proved to conform to the intransitive noninterference model,and an implementation framework is put forward.
Keywords:trusted computing  Trusted Computing Base(TCB)  trusted channel  noninterference  
本文献已被 CNKI 维普 万方数据 等数据库收录!
点击此处可从《计算机工程与应用》浏览原始摘要信息
点击此处可从《计算机工程与应用》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号