Font Size: a A A

Construction And Application Of Chain Of Trust Model Based On Entity Dependence

Posted on:2016-04-14Degree:MasterType:Thesis
Country:ChinaCandidate:C LiFull Text:PDF
GTID:2308330470460338Subject:Computational Mathematics
Abstract/Summary:PDF Full Text Request
Trusted computing provides a new way for information security, and trust chain is a pivotal technology of trusted computing. Because most of existing trust chain models give their formal description in allusion to speci?c trusted computing platform,there is no a comprehensive theoretical model of trust chain. What’s more,the method that using visualization technology to dynamically build a trust chain has a good prospect in both theory and application. In view of this, the paper made the following studies on the basis of the entity dependence and visualization technology.Firstly, this paper builds a new trust chain model based on logic of secure system and entity dependence. A trusted computing environment system is decomposed into a series of entities, at some point, the state of the system is decided by encapsulated entities. This model gives a formal de?nition and proof of trusted set and trust measurement and so on through entity dependence. In addition, the trust chain model not only can provide theoretical basis for assessing the pre-existing trusted computing environment, but also it can provide theoretical support for the further research on building a more excellent trust chain.Secondly, this paper uses a hardware auxiliary visualization technology to dynamically build a trust chain with dynamic trusted measuring way. The trusted network connect component and the original client operation system inner core do not need to be changed. The lightweight virtual machine monitor is dynamically loaded to the time the operating system is restarted. The behavior of an executing environment is monitored and measured transparently so that the trusted network connect request is achieved, and measurement during operation is provided.
Keywords/Search Tags:Trusted Computing, Trust Chain, LVMM, Entity Dependence, TNC
PDF Full Text Request
Related items