首页 | 官方网站   微博 | 高级检索  
     

TCB可信扩展模型研究
引用本文:李勇,王飞,胡俊,沈昌祥.TCB可信扩展模型研究[J].计算机工程与应用,2010,46(13):1-3.
作者姓名:李勇  王飞  胡俊  沈昌祥
作者单位:1.解放军信息工程大学 电子技术学院,郑州 450004 2.解放军装备指挥技术学院,北京 101416 3.北京工业大学 计算机学院,北京 100022
基金项目:国家重点基础研究发展规划(973)No.2007CB311100~~
摘    要:TCB的可信性与系统安全密切相关。随着TCB边界的不断扩大,保证TCB边界可信扩展成为信息安全防范的重要环节。目前针对TCB扩展的研究主要集中在技术层面,理论研究相对欠缺。基于可信计算思想研究了TCB可信扩展模型,依据安全策略将TCB层次化分割为TCB子集,形式化描述了TCB子集之间的可信支撑关系,证明了TCB可信扩展性的必要条件,提出了模型的实施框架。

关 键 词:可信计算  可信计算基(TCB)  可信计算基(TCB)子集  
收稿时间:2010-1-25
修稿时间:2010-3-12  

Research of trusted expand model of TCB
LI Yong,WANG Fei,HU Jun,SHEN Chang-xiang.Research of trusted expand model of TCB[J].Computer Engineering and Applications,2010,46(13):1-3.
Authors:LI Yong  WANG Fei  HU Jun  SHEN Chang-xiang
Affiliation:1.Institute of Electronic Technology,PLA Information Engineering University,Zhengzhou 450004,China 2.PLA Institute of Equipment Command Technology,Beijing 101416,China 3.Institute of Computer,Beijing University of Technology,Beijing 100022,China
Abstract:TCB is the collectivity of the computer's protector,which influences the security of system.With the development of the information technology,the boundary of TCB has been expanded.The validity of the TCB expanding becomes more and more important for information security.At present most of the researches of TCB are focused on the technology of trusted chain,and there is almost no theory research.This paper puts forward Trusted Expand Model of TCB(TEMT) based on the idea of trusted computing,in which TCB is ...
Keywords:trusted computing  Trusted Computing Base(TCB)  Trusted Computing Base(TCB) subset
本文献已被 CNKI 维普 万方数据 等数据库收录!
点击此处可从《计算机工程与应用》浏览原始摘要信息
点击此处可从《计算机工程与应用》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号