Indexed by:
Abstract:
Based on the trusted computing and security protocol technology, the paper designs the delegate-based property remote attestation protocol and proves the security applied the strand space theory. The protocol is designed in the public key infrastructure environment performs the function of the verifier delegation through the third trusted party, and realizes the transform from binary fingerprint to security property. This protocol sets up security channel and realizes access control mechanism based on authorization by cipher technology, which ensures integrity of communication terminal by trusted computing technologies. Our proposal meets the security request of the primary binary remote attestation with applicability and feasibility.
Keyword:
Reprint Author's Address:
Email:
Source :
Journal of Beijing University of Technology
ISSN: 0254-0037
Year: 2010
Issue: SUPPL. 2
Volume: 36
Page: 7-10,26
Cited Count:
WoS CC Cited Count: 0
SCOPUS Cited Count:
ESI Highly Cited Papers on the List: 0 Unfold All
WanFang Cited Count:
Chinese Cited Count:
30 Days PV: 5
Affiliated Colleges: