作者投稿和查稿 主编审稿 专家审稿 编委审稿 远程编辑

计算机工程 ›› 2008, Vol. 34 ›› Issue (6): 176-178. doi: 10.3969/j.issn.1000-3428.2008.06.064

• 安全技术 • 上一篇    下一篇

基于平台可信链的可信边界扩展模型

刘 皖1,谭 明2,郑 军3   

  1. (1. 解放军信息工程大学电子技术学院,郑州 450004;2. 总参谋部第五十一研究所,北京 100072;3. 总参谋部第五十七研究所,成都 610000)
  • 收稿日期:1900-01-01 修回日期:1900-01-01 出版日期:2008-03-20 发布日期:2008-03-20

Trusted Boundary Extension Model Based on Trusted Chain on Platform

LIU Wan1, TAN Ming2, ZHENG Jun3   

  1. LIU Wan1, TAN Ming2, ZHENG Jun3
    (1. Institute of Electronic Technology, PLA Information Engineering University, Zhengzhou 450004;2. The Fifty-first Graduate School of General Staff, Beijing 100072; 3. The Fifty-seventh Graduate School of General Staff, Chengdu 610000)
  • Received:1900-01-01 Revised:1900-01-01 Online:2008-03-20 Published:2008-03-20

摘要: 以可信终端、可信连接、可信网络为代表的可信计算技术立足于终端和网络的自身免疫,开辟了以信任促安全的新思路,成为众多安全公司解决安全问题的热选技术。该文以可信终端技术中的可信链模型为对象,系统研究了可信链的概念模型,给出建模过程、模型的原型实现并指出该模型较之传统安全模型的优点。

关键词: 可信计算, 平台可信链, 可信边界扩展, 概念模型

Abstract:

Trusted computing technologies typically used in trusted terminal, trusted connect, trusted network, focusing on the self immunity of terminal and network, put forwards the thinking which accomplishes security in the way of building trust. It becomes the first choice of many information security companies. This paper chooses the trusted-chain model of trusted terminal technology as the research object, studies the conception model of trusted-chain, gives the modeling process, the realization of the model’s antetype, and points out the advantages of the model compared with the conditional information security model.

Key words: trusted computing, trusted chain on platform, trusted boundary extension, conception model

中图分类号: