欢迎来到天天文库
浏览记录
ID:32184767
大小:5.97 MB
页数:42页
时间:2019-02-01
《基于tpm的可信度量机制分析》由会员上传分享,免费在线阅读,更多相关内容在学术论文-天天文库。
1、万方数据山东大学硕士学位论文ABSTRACTThe21stcenturyistheageofinformation.Ontheonehand,therapiddevelopmentofinformationtechnologyandindustryshowunprecedentedprosperity.Ontheotherhand,informationsecurityincidentscontinuetooccur,informationsituationissevere.Facedwiththegrimsituationofcomputernetworkandinfo
2、rmationsecurity,mostoftheinformationsecuritysystemsmainlyconsistofpassivedefensivetechnicalmeasuressuchasfirewallintrusiondetectionandvirusprotectionsoftware,etc,didnotgetaverygoodresults.Throughlong-termpracticesummary,peoplegraduallybegantorealizethatonlyfromunderlyinghardwareandsoftwar
3、estarttotakemeasure,itispossibletoconstructainformationsystemofhighsecurity.Formthisthough,TrustedComputingtechnologyhaveemergedanddevelopedrapidly.Inthispaper,startingfromtheideaoftrustedcomputing,studythecomputersystemsecurityissues,TrustedComputerSystemarchitectureandproposeanewtrusted
4、measurementschemebasedontIleTPM.TheschemeCansolvetheTOC.TOUdefectoftraditionalmechanism,Candetecttheoperationofthewholeprocess,Canidentitysuspiciousbehaviorofcomputer,Canensurethecomputersystemsecurity.Computersecurityisahotissureofcomputertechnology,itontonlyaffectthefurtherdevelopmentof
5、computertechnology,butalsoposeathreattopeopleandproperty,itisofgreatsignificancetorasearchoncomputersecurity.Theworkandmaininnovationsofthispaperarefollowing:1:ProposeadynamicmeasurementschemebasingonTPM.ThisschemeCaneffectivelydetectthewholeoperationofcomputernmning,CansolvetheTOC-TOUdef
6、ectoftraditionmechanism,Caneffectivelydefencebufferoverflowattacks.Throughexperimentsshowthattheschemehasworkwellandplayedacertionaffect.2:Throughin—depthresearch,trytocombineoftrustedcomputingtechnologyandtraditionalinformationsecuritytechnologytobuildamoresecure,reliableIII万方数据些奎丕堂亟±堂鱼笙
7、塞一.infomlationsystems.Researchmainlyfocusedonsecureoperatingsystemandvirtualizationtechnology.3:Imple:mentatraditionalTCGstandardmastedchainbasedonembeddedboardandlinuxsystem,throughactualoperationstudythetraditionalcrediblechaintechnologyinmoredepth,summaryanddiscu
此文档下载收益归作者所有