Font Size: a A A

Based On The Linux Terminal Trusted Chain

Posted on:2013-04-27Degree:MasterType:Thesis
Country:ChinaCandidate:K ShiFull Text:PDF
GTID:2248330395474513Subject:Software engineering
Abstract/Summary:PDF Full Text Request
With the development of information security, trusted computing technology has become one of the important technologies of the information security field, through a combination of hardware and software architecture to use to build their own strong immune system, different from the anti-virus software and other passive defense toestablish platform identity uniquely identifies the credibility of the identification as the basis to ensure safety and to achieve effective in ensuring data security.Of this research work is devoted to a trusted operating system in a Linux environment to build a safer, to be complete and reliable software application layer chain from a hardware root of trust, trust pass through the grading on the chain, a fundamental solution to operating system trusted to protect a single problem. From the underlying hardware to the operating system kernel to the application software layer trusted structure, set up a way to ensure the completion of the terminal hardware, Linux operating system and Java application environment trusted computing platform, the Linux-based JAVA execution environment can be the design of the letter system.This thesis is focused on trusted operating systems and trusted applications not covered in the specification of the Trusted Computing Group (Trusted Computing Group), the framework of a complete Linux-based chain of trust and trust transfer mechanism has a certain reference value, the development of trusted computing and comprehensive; transitive trust by using a hierarchical control technology, and effective solution to security issues under the existing terminal security model. Based on an analysis of the current status of information security and endpoint security technology the future direction of the detailed description of the design of the trusted computing platform to build a complete grading credible delivery system under the Linux operating system, Java execution environment. Reliable storage root of trust, to pass control to the credibility of the hardware environment, operating system and application environment, operating system security and application integrity verification to ensure that technical. Ensure fundamental to avoid malicious tampering and attack of trojan or illegal procedures, and the current security reporting capabilities of the hardware and software environment.
Keywords/Search Tags:trusted computing, Transitive trust control, Trusted chain, The JAVA virtualmachine
PDF Full Text Request
Related items