Font Size: a A A

The Research Of Theory And Technology Of The Trust Chain Of Trusted Computing Platform

Posted on:2012-09-02Degree:MasterType:Thesis
Country:ChinaCandidate:L M SiFull Text:PDF
GTID:2178330338491405Subject:Computer Science and Technology
Abstract/Summary:PDF Full Text Request
The computer security problem's basic reason lies in the existing PC unreliability. When PC was designed without consider its security, the lack of good hardware defensive measures, make the existing security solutions many is pure software, lacking of hardware support, and fragile. In order to solve this problem, TCG put forward the thought with trusted computing method of constructing reliable platform. The establishment of the trust chain is the key to constructing trusted computing platform. Whether domestic or abroad, in theory field, trusted computing is in technology advanced in theory, theory lags technical status, in order to improve the trusted computing theory, on trust the chain transfer theory and technique for research.The operating system start-up phase is a single chain of fixed order process, so the phase of the trust chain transfer has been extensively studied and larger development. From the operating system to the application, due to the application of the terminal platform characteristics such as variety and disorder, the system credible verification mechanism to guide a single chain does not apply to the operating system to the reliability of transmission between applications, this paper concentrates on the application environment of trust chain of transmission.In this paper the main work done as follows:1)A kind of application layer trust chain transmission model is proposed, this model is used to describe the trust relationship between the application.2)Based on noninterference theory, the system is abstracted as the application procedure, actions, states and outputs, and giving the formal definition of the trusted of application procedure running. And proving the application environment based on this model is credible decision theorem.3)For existing trusted application environment construction method are analyzed, choose appropriate trusted application environment construction method and construct a trusted application environment, to maintain the trust chain transfer.
Keywords/Search Tags:trusted computing, trust chain, noninterference theory, trusted application environment
PDF Full Text Request
Related items