计算机工程 ›› 2010, Vol. 36 ›› Issue (10): 25-28.doi: 10.3969/j.issn.1000-3428.2010.10.008

• 博士论文 • 上一篇    下一篇

基于法予权利权利义务模型的可信计算环境实现

周 毅,郑雪峰,于义科   

  1. (北京科技大学信息工程学院计算机系,北京 100083)
  • 收稿日期:1900-01-01 修回日期:1900-01-01 出版日期:2010-05-20 发布日期:2010-05-20

Implementation of Trusted Computing Environment Based on Rights and Obligations Model

ZHOU Yi, ZHENG Xue-feng, YU Yi-ke   

  1. (School of Information Engineering, University of Science and Technology BeijingComputer College, Beijing University of Science and Technology, Beijing 100083)
  • Received:1900-01-01 Revised:1900-01-01 Online:2010-05-20 Published:2010-05-20

摘要: 针对目前对信任的定义和模型没有尚未建立通用表达的研究现状问题,提出了一种基于现有计算机网络的可信计算平台模型,该模型充分利用了现有的计算机及其网络平台的通用性,提出一个可信计算平台模型。通过把现有的计算平台分层逻辑化为不同的信任层,降低了可信计算平台模型实施的难度,提高了其灵活性、扩展性和效率。,同时该模型从在客户端系统的引导阶段出发构建完整的可信链,以保证了可信计算平台的安全性。原型系统的实现的结果表明:由于,系统中所有的计算机及其网络构成统一的可信计算平台,使信任的传递从用户到用户,进而实现真正的对于用户体验间的可信计算。

关键词: 可信计算, 可信计算环境, 信任模型

Abstract:

Aiming at the definitionproblem of that the trust definition and the current model of trust has not been establishedve no common definitionsrepresentations currently ,The general description to the definition the and model of the trust must be needed, therefore we this paper presents a trusted computing platform model based on existing computer network, whichby makes full use of using the versatility of existing computer and network platform and it’s versatility. Through By putting the existing computing layered platforms into different logical trust layers, not onlyit reduces the difficulty of the implementation to theing trusted computing platform models but also , and improves its flexibility, scalability and efficiency of the models. At the same time, tAhe model building the credibility of a complete trusted chain is established based on in the starting phase to of the client system, thereby ensuring to ensure the security of trusted computingthe platform security. The Implementation results of the implementation to the prototype system showed that:t in the system, all the computers and their networks in the system constitute a unified platform for trusted computing, which mademakes the transfer of trust from the the user to the the user come true, and then realizeand realizes the true user experience for the trusted computing between users.

Key words: trusted computing, Trusted Computing Environment(TCE), trust model

中图分类号: