基于可信计算平台的自动信任协商分析-analysis of automatic trust negotiation based on trusted computing platform.docxVIP
- 1、原创力文档(book118)网站文档一经付费(服务费),不意味着购买了该文档的版权,仅供个人/单位学习、研究之用,不得用于商业用途,未经授权,严禁复制、发行、汇编、翻译或者网络传播等,侵权必究。。
- 2、本站所有内容均由合作方或网友上传,本站不对文档的完整性、权威性及其观点立场正确性做任何保证或承诺!文档内容仅供研究参考,付费前请自行鉴别。如您付费,意味着您自己接受本站规则且自行承担风险,本站不退款、不进行额外附加服务;查看《如何避免下载的几个坑》。如果您已付费下载过本站文档,您可以点击 这里二次下载。
- 3、如文档侵犯商业秘密、侵犯著作权、侵犯人身权等,请点击“版权申诉”(推荐),也可以打举报电话:400-050-0827(电话支持时间:9:00-18:30)。
- 4、该文档为VIP文档,如果想要下载,成为VIP会员后,下载免费。
- 5、成为VIP后,下载本文档将扣除1次下载权益。下载后,不支持退款、换文档。如有疑问请联系我们。
- 6、成为VIP后,您将拥有八大权益,权益包括:VIP文档下载权益、阅读免打扰、文档格式转换、高级专利检索、专属身份标志、高级客服、多端互通、版权登记。
- 7、VIP文档为合作方或网友上传,每下载1次, 网站将根据用户上传文档的质量评分、类型等,对文档贡献者给予高额补贴、流量扶持。如果你也想贡献VIP文档。上传文档
查看更多
基于可信计算平台的自动信任协商分析-analysis of automatic trust negotiation based on trusted computing platform
中南民族大学硕士学位论文
基于可信计算平台的自动信任协商研究
I
II
摘 要
网络环境中陌生实体间信任关系的建立是实现资源共享和互操作的前提。自 动信任协商作为一种新型的访问控制技术,它为处 于不同安全域的陌生实体间建 立信任关系提供有效地方法,进而实现动态授权。信任协商必须重点考虑的是协 商过程中双方的隐私保护问题以及如何提高协商效率。可信计算的主要思想是在 终端平台内部加入安全芯片,作为底层信任根,辅以其他硬件、固件和软件,利 用自下而上逐级的完整性度量构建信任链的方式,使终端平台变成一个可信的运 行环境。
文章先对可信计算平台作了研究,主要包括:平台的体系结构、TPM 各功能 组件以及平台的原理机制,接着研究了自动信任协商,包括信任协商的相关概念、 体系结构、基于 XML 的策略语言、常见的攻击与防范等。由于 可信 PC 机是目前 应用最广泛的可信计算平台,本文提出了一种基于可信 PC 机的自动信任协商框 架模型。文章先后说明了可信 PC 机的结构与功能,提出了框架的整体结构图, 分别说明各模块的功能。其中,引入信任域的概念,提出了一种新型的信任度评 估方法,并描述了基于该框架的完整的信任协商流程。将信任协商中典型的实例 应用于本文提出的框架中,分别对该实例采用的两种极端协商策略以及融合了信 任度的自适应策略的协商过程进行了直观的描述。对各种情况的时间开销进行比 较,突出了融合了信任度的自适应策略在协商效率上的优势,并且对整个协商框 架的安全性进行了理论上的分析。最后,总结全文并指出该 ATN 框架模型在未来 的研究方向。
关键词:可信计算平台;TPM;信任域;信任评估;自动信任协商
Abstract
It’s the premise that establishing a trust relationship between strangers in the network environment to realize the sharing resources and interoperability. Automated trust negotiation as a new access control technology, establish ing a trust relationship between strangers in different security domains effectively, so as to realize the dynamic authorization. The trust negotiation must focus on considering the problem of privacy protection and how to improve negotiation efficiency. The main idea of trusted computing is to add security chip inside the terminal platform as the underlying root of trust, combined with other hardware, firmware and software, using integrity measurement step by step from bottom to top to build a chain of trust, aimed at the terminal platform become a trusted operating environment.
The article first made a study of trusted computing platform , mainly including: platform architecture, each functional components of the TPM and platform principle mechanism. And then study the automated trust negotiation, including related concepts and architecture of it. XML based policy language, common attacks and prevention. As the trusted PC is currently the most widely t rusted computing platform, the paper presents an automated tru
您可能关注的文档
- 基于可持续视角的旅游用地模式分析——以乌鲁木齐南山风景区为例-analysis of tourism land pattern based on sustainable perspective - taking nanshan scenic spot in urumqi as an example.docx
- 基于可持续视角的旅游用地模式研究——以乌鲁木齐南山风景区为例-study on tourism land pattern based on sustainable perspective - taking nanshan scenic spot in urumqi as an example.docx
- 基于可持续发展理念城市老工业园的更新改造——以慈湖经济开发区为例-renovation of old urban industrial parks based on the concept of sustainable development - taking cihu economic development zone as an example.docx
- 基于可持续增长视角的上市公司融资策略分析-analysis of financing strategies of listed companies based on the perspective of sustainable growth.docx
- 基于可分级视频的联合信源信道编码技术分析-analysis of joint source-channel coding technology based on scalable video.docx
- 基于可穿戴计算的设备维护辅助系统自适应用户界面分析-adaptive user interface analysis of equipment maintenance assistance system based on wearable computing.docx
- 基于可见光图像和红外热像融合自发表情识别-spontaneous expression recognition base on fusion of visible light image and infrared thermal image.docx
- 基于可穿戴计算的设备维护协同作业支撑系统分析-analysis of equipment maintenance cooperative work support system based on wearable computing.docx
- 基于可竞争市场理论的输电市场管制机制设计-design of transmission market control mechanism based on contestable market theory.docx
- 基于可纠错编码的结构光三维测量方法分析-analysis of three-dimensional measurement method of structured light based on error correction coding.docx
- 基于可信密码模块的数据安全管理系统关键技术分析-key technology analysis of data security management system based on trusted cryptographic module.docx
- 基于可用性研究的中国民族乐器新形制探索——以古筝交互界面设计为例-exploration of new forms of chinese national musical instruments based on usability research - taking the design of guzheng interactive interface as an example.docx
- 基于可召回机制的航空公司座位存量控制分析-analysis of airline seat stock control based on recall mechanism.docx
- 基于可用性的老年人手机界面设计分析-design and analysis of mobile phone interface for the elderly based on usability.docx
- 基于可理解性分析的商业步行街外部空间结构设计分析——以汉中市万邦时代广场二期商业步行街设计为例-design and analysis of external space structure of commercial pedestrian street based on intelligibility analysis - taking the second phase commercial pedestrian street design of wanba.docx
- 基于可重构处理器的视觉并行处理算子库分析-analysis of visual parallel processing operator library based on reconfigurable processor.docx
- 基于可重构处理器的并行视觉处理算法分析-analysis of parallel visual processing algorithm based on reconfigurable processor.docx
- 基于可重构处理器的视觉处理子系统的分析与设计-analysis and design of vision processing subsystem based on reconfigurable processor.docx
- 基于客户关系管理的保税油供应商营销策略分析——以中石化燃料油销售有限公司为例-marketing strategy analysis of bonded oil suppliers based on customer relationship management - taking sinopec fuel oil sales co., ltd. as an example.docx
- 基于客户导向的综合房地产企业运营管理模式与应用分析-operation and management mode and application analysis of comprehensive real estate enterprises based on customer orientation.docx
文档评论(0)