资源描述:
《一种基于tpm匿名证书信任协商方案》由会员上传分享,免费在线阅读,更多相关内容在行业资料-天天文库。
1、计算机研究与发展ISSN100021239PCN1121777PTPJournalofComputerResearchandDevelopment45(8):127921289,2008一种基于TPM匿名证书的信任协商方案1,2,311,2石志国贺也平张宏1(北京科技大学信息工程学院北京100083)2(中国科学院软件所基础软件国家工程中心北京100190)3(中国科学院研究生院北京100049)(szg@ercist.iscas.ac.cn)AScenarioofTrustNegotiationBasedonTPMAn
2、onymousCredentials1,2,311,2ShiZhiguo,HeYeping,andZhangHong1(SchoolofInformationEngineering,UniversityofScienceandTechnology,Beijing100083)2(NationalEngineeringCenterforFundamentalSoftware,InstituteofSoftware,ChineseAcademyofSciences,Beijing100190)3(GraduateUniver
3、sityofChineseAcademyofSciences,Beijing100049)AbstractAneffectivesensitiveinformationprotectionmechanismintrustnegotiationisneededtopromotesharingandcollaborationbetweensecuritydomainsindistributednetworkcomputing.TCGisanindustrystandardizationbodythataimstodevelo
4、pandpromoteanopenindustrystandardfortrustedcomputinghardwareandsoftwarebuildingblockstoenablemoresecuredatastorage,onlinebusinesspractices,andonlinecommercetransactionswhileprotectingprivacyandindividualrights.Thenovelanonymouscredentialsbasedtrustednegotiationsy
5、stem(ACTN)isdesignedandimplementedbasedontheTPManonymouscredentialsoftrustedcomputing,whichexcellentlydealswiththedifficultyoftheprotectionofsensitiveresourcesbetweenstrangers.Thescenarioresiststhereplayattacks,tamperingattacks,masquerading,andthemechanismisbased
6、onahardwaremodule,calledtrustedplatformmodule.ThemodelofACTNandtheanonymouscredentialsaredefinedindetail;theparameterandtheconstructmethodofanonymouscredentialsareexplained;thesecurityofpolicy,themechanismofdelegationandthecredentialchaindiscoveryarediscussed;the
7、frameworkofnegotiationnodesandtheprocessofnegotiationaredesignedinaddition.TheresultsoftheexperimentsarecomparedwiththeTrustBuilderandCOTNnegotiationsystem,andtheresultsprovethesoundperformanceandgoodsecurityguarantee.Finally,somerelatedfutureresearchfieldsofthep
8、aperarepointedout.Keywordsinformationsecurity;automatedtrustnegotiation;trustedcomputing;anonymouscredential;accesscontrol摘要为促进分布式网络环境中跨安全域的信息共享与协作,需要一种合理有效的信任