Advertisement

Wuhan University Journal of Natural Sciences

, Volume 10, Issue 1, pp 35–38 | Cite as

Analysis and application for integrity model on trusted platform

  • Tu Guo-qing
  • Zhang Huan-guo
  • Wang Li-na
  • Yu Dan-dan
Trusted Software and Hardware

Abstract

To build a trusted platform based on Trusted Computing Platform Alliance (TCPA)'s recommendation, we analyze the integrity mechanism for such a PC platform in this paper. By combinning access control model with information flow model, we put forward a combined process-based lattice model to enforce security. This model creates a trust chain by which we can manage a series of processes from a core root of trust module to some other application modules. In the model, once the trust chain is created and managed correctly, the integrity of the computer's hardware and sofware has been mainfained, so does the confidentiality and authenticity. Moreover,a relevant implementation of the model is explained.

Key words

trusted computing access control model information flow model trust chain integrity 

CLC number

TP 302 TP 309 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. [1]
    Grawrock D. Building Trust and Privacy into Open PC Systems,http://www.intel.com/update/departments/initech, Nov 2000.Google Scholar
  2. [2]
    The Trusted Computing Platform Alliance, TCPA Main Specification vl. 1b.http://www.trustedcomputing, org/home, Oct 2002.Google Scholar
  3. [3]
    Manocha H. Protection: Bell-Lapadula Model,http://courses. cs. vt.edu/∼cs5204/fall99/protection/harsh/, May 2004.Google Scholar
  4. [4]
    Denning D E. A Lattice Model of Secure Information Flow.Communications of the ACM. New York: ACM Press, 1976, 236–243.Google Scholar
  5. [5]
    The Trusted Computing Platform Alliance. TCPA Design Philosophies & Concepts vl. 0.http://www.trustedcomputing. org/home, October, 2002.Google Scholar
  6. [6]
    Abdul-Rahman A, Hailes S. A Distributed Trust Model.Proceedings ACM New Security Paradigms Workshop '97. New York: ACM Press, 1998, 48–60.Google Scholar
  7. [7]
    Kagal L, Cost S, Finin T,et al. A Framework for Distributed Trust Management,Proceedings of the Second Workshop on Norms and Institutions in multiagent systems, Autonomous Agents 2001, Montreal, Canada, May 29, 2001.http://www. cs. umbc. edu/≈ finin/papers/nimas01/nimas01. pdf, Oct 2002.Google Scholar

Copyright information

© Springer 2005

Authors and Affiliations

  • Tu Guo-qing
    • 1
  • Zhang Huan-guo
    • 1
  • Wang Li-na
    • 1
  • Yu Dan-dan
    • 1
  1. 1.School of ComputerWuhan UniversityWuhanChina

Personalised recommendations