基于tpm的可信度量机制分析

基于tpm的可信度量机制分析

ID:32184767

大小:5.97 MB

页数:42页

时间:2019-02-01

基于tpm的可信度量机制分析_第1页
基于tpm的可信度量机制分析_第2页
基于tpm的可信度量机制分析_第3页
基于tpm的可信度量机制分析_第4页
基于tpm的可信度量机制分析_第5页
资源描述:

《基于tpm的可信度量机制分析》由会员上传分享,免费在线阅读,更多相关内容在学术论文-天天文库

1、万方数据山东大学硕士学位论文ABSTRACTThe21stcenturyistheageofinformation.Ontheonehand,therapiddevelopmentofinformationtechnologyandindustryshowunprecedentedprosperity.Ontheotherhand,informationsecurityincidentscontinuetooccur,informationsituationissevere.Facedwiththegrimsituationofcomputernetworkandinfo

2、rmationsecurity,mostoftheinformationsecuritysystemsmainlyconsistofpassivedefensivetechnicalmeasuressuchasfirewallintrusiondetectionandvirusprotectionsoftware,etc,didnotgetaverygoodresults.Throughlong-termpracticesummary,peoplegraduallybegantorealizethatonlyfromunderlyinghardwareandsoftwar

3、estarttotakemeasure,itispossibletoconstructainformationsystemofhighsecurity.Formthisthough,TrustedComputingtechnologyhaveemergedanddevelopedrapidly.Inthispaper,startingfromtheideaoftrustedcomputing,studythecomputersystemsecurityissues,TrustedComputerSystemarchitectureandproposeanewtrusted

4、measurementschemebasedontIleTPM.TheschemeCansolvetheTOC.TOUdefectoftraditionalmechanism,Candetecttheoperationofthewholeprocess,Canidentitysuspiciousbehaviorofcomputer,Canensurethecomputersystemsecurity.Computersecurityisahotissureofcomputertechnology,itontonlyaffectthefurtherdevelopmentof

5、computertechnology,butalsoposeathreattopeopleandproperty,itisofgreatsignificancetorasearchoncomputersecurity.Theworkandmaininnovationsofthispaperarefollowing:1:ProposeadynamicmeasurementschemebasingonTPM.ThisschemeCaneffectivelydetectthewholeoperationofcomputernmning,CansolvetheTOC-TOUdef

6、ectoftraditionmechanism,Caneffectivelydefencebufferoverflowattacks.Throughexperimentsshowthattheschemehasworkwellandplayedacertionaffect.2:Throughin—depthresearch,trytocombineoftrustedcomputingtechnologyandtraditionalinformationsecuritytechnologytobuildamoresecure,reliableIII万方数据些奎丕堂亟±堂鱼笙

7、塞一.infomlationsystems.Researchmainlyfocusedonsecureoperatingsystemandvirtualizationtechnology.3:Imple:mentatraditionalTCGstandardmastedchainbasedonembeddedboardandlinuxsystem,throughactualoperationstudythetraditionalcrediblechaintechnologyinmoredepth,summaryanddiscu

当前文档最多预览五页,下载文档查看全文

此文档下载收益归作者所有

当前文档最多预览五页,下载文档查看全文
温馨提示:
1. 部分包含数学公式或PPT动画的文件,查看预览时可能会显示错乱或异常,文件下载后无此问题,请放心下载。
2. 本文档由用户上传,版权归属用户,天天文库负责整理代发布。如果您对本文档版权有争议请及时联系客服。
3. 下载前请仔细阅读文档内容,确认文档内容符合您的需求后进行下载,若出现内容与标题不符可向本站投诉处理。
4. 下载文档时可能由于网络波动等原因无法下载或下载错误,付费完成后未能成功下载的用户请联系客服处理。