高级检索
    赵 佳, 沈昌祥, 刘吉强, 韩 臻. 基于无干扰理论的可信链模型[J]. 计算机研究与发展, 2008, 45(6).
    引用本文: 赵 佳, 沈昌祥, 刘吉强, 韩 臻. 基于无干扰理论的可信链模型[J]. 计算机研究与发展, 2008, 45(6).
    Zhao Jia, Shen Changxiang, Liu Jiqiang, Han Zhen. A Noninterference-Based Trusted Chain Model[J]. Journal of Computer Research and Development, 2008, 45(6).
    Citation: Zhao Jia, Shen Changxiang, Liu Jiqiang, Han Zhen. A Noninterference-Based Trusted Chain Model[J]. Journal of Computer Research and Development, 2008, 45(6).

    基于无干扰理论的可信链模型

    A Noninterference-Based Trusted Chain Model

    • 摘要: 可信计算的相关研究已成为当前国内外信息安全方面的研究热点和趋势之一.可信计算技术也成为构建安全计算机系统行之有效的新技术.目前可信计算理论的发展滞后于技术的发展,针对可信计算中可信链传递缺乏理论模型的问题,将无干扰理论引入到可信计算领域,提出了计算机系统可信的基本理论.从动态的角度建立了基于无干扰理论的可信链模型,并对该模型进行了形式化描述和验证,而且实现了基于Linux操作系统内核的可信启动过程.其实现思路对于可信计算理论的发展和应用具有很好的参考价值.

       

      Abstract: The traditional information security systems, such as firewall, intrusion detection and anti-virus, are all preventing attacks from the outside. But these methods cant meet the various security requirements. Therefore, experts appeal to solve the problems from the inner. Under this background, TCG proposed the conception of trusted computing. It aims to improve the security on the terminals. At present, trusted computing and its related researches are the focus and trend of information security in inland and oversea. Trusted computing is the foundation of the security, and it may solve the insecure problem caused by the platform of hardware in PC. Trust chain starts from the trust root. TCG introduces the idea of the trusted into the computing environment, but there is still not the formalized uniform description. Trusted computing is still a technology but not a theory, and the basic theory model has not been established. Noninterference theory is introduced into the domain of trusted computing to construct the trusted chain theoretic model. The basic theory of the computing trusted is proposed and a noninterference-based trusted chain model is built from the dynamic point of view, and then the model is formalized and verified. Finally, the process of start up based on Linux operating system kernel is implemented. The implementation provides a good reference for the development and application of the trusted computing theory as well.

       

    /

    返回文章
    返回