检索规则说明:AND代表“并且”;OR代表“或者”;NOT代表“不包含”;(注意必须大写,运算符两边需空一格)
检 索 范 例 :范例一: (K=图书馆学 OR K=情报学) AND A=范并思 范例二:J=计算机应用与软件 AND (U=C++ OR U=Basic) NOT M=Visual
作 者:CHEN Lu ZHANG Huanguo ZHANG Liqiang LI Song CAI Liang
机构地区:[1]School of Computer, Wuhan University/Key Laboratory ofAerospace Information Security and Trusted Computing of Ministryof Education, Wuhan 430072, Hubei, China [2]State Key Laboratory of Software Engineering, WuhanUniversity, Wuhan 430072, Hubei, China [3]Department of Information Security, Information EngineeringUniversity, Zhengzhou 450004, Henan, China
出 处:《Wuhan University Journal of Natural Sciences》2008年第5期523-527,共5页武汉大学学报(自然科学英文版)
基 金:the National Natural Science Foundation of China (60673071, 60743003,90718005,90718006);the National High Technology Research and Development Program of China (2006AA01Z442,2007AA01Z411)
摘 要:Facing the increasing security issues in P2P networks, a scheme for resource sharing using trusted computing technologies is proposed in this paper. We advance a RS-UCON model with decision continuity and attribute mutability to control the usage process and an architecture to illustrate how TC technologies support policy enforcement with bidirectional attestation. The properties required for attestation should include not only integrity measurement value of platform and related application, but also reputation of users and access history, in order to avoid the limitation of the existing approaches. To make a permission, it is required to evaluate both the authorization and conditions of the subject and the object in resource usage to ensure trustable resources to be transferred to trusted users and platform.Facing the increasing security issues in P2P networks, a scheme for resource sharing using trusted computing technologies is proposed in this paper. We advance a RS-UCON model with decision continuity and attribute mutability to control the usage process and an architecture to illustrate how TC technologies support policy enforcement with bidirectional attestation. The properties required for attestation should include not only integrity measurement value of platform and related application, but also reputation of users and access history, in order to avoid the limitation of the existing approaches. To make a permission, it is required to evaluate both the authorization and conditions of the subject and the object in resource usage to ensure trustable resources to be transferred to trusted users and platform.
关 键 词:resource sharing trusted computing VIRTUALIZATION UCON (usage control) chain of trust
分 类 号:TP309[自动化与计算机技术—计算机系统结构]
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在链接到云南高校图书馆文献保障联盟下载...
云南高校图书馆联盟文献共享服务平台 版权所有©
您的IP:3.144.229.52