• Complex
  • Title
  • Keyword
  • Abstract
  • Scholars
  • Journal
  • ISSN
  • Conference
搜索

Author:

Zhao, Jia (Zhao, Jia.) | Shen, Changxiang (Shen, Changxiang.) | Liu, Jiqiang (Liu, Jiqiang.) | Han, Zhen (Han, Zhen.)

Indexed by:

EI Scopus PKU CSCD

Abstract:

The traditional information security systems, such as firewall, intrusion detection and anti-virus, are all preventing attacks from the outside. But these methods can't meet the various security requirements. Therefore, experts appeal to solve the problems from the inner. Under this background, TCG proposed the conception of trusted computing. It aims to improve the security on the terminals. At present, trusted computing and its related researches are the focus and trend of information security in inland and oversea. Trusted computing is the foundation of the security, and it may solve the insecure problem caused by the platform of hardware in PC. Trust chain starts from the trust root. TCG introduces the idea of the trusted into the computing environment, but there is still not the formalized uniform description. Trusted computing is still a technology but not a theory, and the basic theory model has not been established. Noninterference theory is introduced into the domain of trusted computing to construct the trusted chain theoretic model. The basic theory of the computing trusted is proposed and a noninterference-based trusted chain model is built from the dynamic point of view, and then the model is formalized and verified. Finally, the process of start up based on Linux operating system kernel is implemented. The implementation provides a good reference for the development and application of the trusted computing theory as well.

Keyword:

Computer operating systems Computer system firewalls Trusted computing Computation theory Intrusion detection Computer viruses Viruses

Author Community:

  • [ 1 ] [Zhao, Jia]School of Computer and Information Technology, Beijing Jiaotong University, Beijing 100044, China
  • [ 2 ] [Shen, Changxiang]School of Computer and Information Technology, Beijing Jiaotong University, Beijing 100044, China
  • [ 3 ] [Shen, Changxiang]College of Computer Science and Technology, Beijing University of Technology, Beijing 100022, China
  • [ 4 ] [Liu, Jiqiang]School of Computer and Information Technology, Beijing Jiaotong University, Beijing 100044, China
  • [ 5 ] [Han, Zhen]School of Computer and Information Technology, Beijing Jiaotong University, Beijing 100044, China

Reprint Author's Address:

Show more details

Related Keywords:

Related Article:

Source :

Computer Research and Development

ISSN: 1000-1239

Year: 2008

Issue: 6

Volume: 45

Page: 974-980

Cited Count:

WoS CC Cited Count: 0

SCOPUS Cited Count:

ESI Highly Cited Papers on the List: 0 Unfold All

WanFang Cited Count:

Chinese Cited Count:

30 Days PV: 9

Online/Total:1272/10613146
Address:BJUT Library(100 Pingleyuan,Chaoyang District,Beijing 100124, China Post Code:100124) Contact Us:010-67392185
Copyright:BJUT Library Technical Support:Beijing Aegean Software Co., Ltd.