Advanced Search
    Zhao Jia, Shen Changxiang, Liu Jiqiang, Han Zhen. A Noninterference-Based Trusted Chain Model[J]. Journal of Computer Research and Development, 2008, 45(6).
    Citation: Zhao Jia, Shen Changxiang, Liu Jiqiang, Han Zhen. A Noninterference-Based Trusted Chain Model[J]. Journal of Computer Research and Development, 2008, 45(6).

    A Noninterference-Based Trusted Chain Model

    • The traditional information security systems, such as firewall, intrusion detection and anti-virus, are all preventing attacks from the outside. But these methods cant meet the various security requirements. Therefore, experts appeal to solve the problems from the inner. Under this background, TCG proposed the conception of trusted computing. It aims to improve the security on the terminals. At present, trusted computing and its related researches are the focus and trend of information security in inland and oversea. Trusted computing is the foundation of the security, and it may solve the insecure problem caused by the platform of hardware in PC. Trust chain starts from the trust root. TCG introduces the idea of the trusted into the computing environment, but there is still not the formalized uniform description. Trusted computing is still a technology but not a theory, and the basic theory model has not been established. Noninterference theory is introduced into the domain of trusted computing to construct the trusted chain theoretic model. The basic theory of the computing trusted is proposed and a noninterference-based trusted chain model is built from the dynamic point of view, and then the model is formalized and verified. Finally, the process of start up based on Linux operating system kernel is implemented. The implementation provides a good reference for the development and application of the trusted computing theory as well.
    • loading

    Catalog

      Turn off MathJax
      Article Contents

      /

      DownLoad:  Full-Size Img  PowerPoint
      Return
      Return