Abstract
Trusted Computing technology is quickly developing in recent years. This technology manages to improve the computer security and archive a trusted computing environment. The core of trusted computing technology is cryptology. In this paper, we analyze the key and credential mechanism which is two basic aspects in the cryptology application of trusted computing. We give an example application to illustrate that the TPM enabled key and credential mechanism can improve the security of computer system.
Similar content being viewed by others
References
Avizienis A, Laprie J C, Randell B,et al. Basic Concepts and Taxonomy of Dependable and Secure Computing [J].IEEE Transactions on Dependable and Secure Computing, 2004,1(1):11–33.
Schechter S E, Greenstadt R A, Smith M D. Trusted Computing, Peer-To-Peer Distribution, and the Economics of Pirated Entertainment [C]//The Second Annual Workshop on Economics and Information Security, College Park, Maryland, May, 2003.
Trusted Computing Group.Trusted Computing Platform Alliance (TCPA) Main Specification Version 1. 1b [R]. New York: TCG, 2003.
ISO/IEC.Information Technology-Open Systems Interconnection-Evaluation Criteria for Information Technology [S]. New York: Standard ISO/IEC 15408, 1999.
Trusted Computing Group.TPM Main Part 1 Design Principles, Specification Version 1.2 [R]. New York: TCG, 2006.
Trusted Computing Group.TPM Main Part 2 TMP Structures, Specification Version 1.2 [R]. New York: TCG, 2006.
Foster I, Kesselman C, Tsudik G,et al. A Security Architecture for Computational Grids [C]//5th ACM Conference on Computer and Communications Security. Washington: ACM press, 1998:83.
Lorch M, Basney J, Kafura D. A Hardware-secured Credential Repository for Grid PKIs [C]//Proc of 4th IEEE/ACM International Symposium on Cluster Computing and the Grid. New York: IEEE Press, 2004:640.
Mao W. Daonity Specification Part I Design. [EB/OL]. [2006-02-20].https://forge.gridforum.org/project/tcrg.
Jason R J M, González N E D. Privacy and Trusted Computing [C]//Proceedings of the 14th International Workshop on Database and Expert Systems Applications. New York: IEEE Press, 2003:383.
Author information
Authors and Affiliations
Corresponding author
Additional information
Foundation item: Supported by the National Natural Science Foundation of China (60373087, 60473023, 90104005) and HP Laboratory of China
Biography: SHEN Zhidong (1975-), male, Ph. D. candidate, research direction; information security, trusted computing.
Rights and permissions
About this article
Cite this article
Zhidong, Z., Huanguo, Z., Miao, Z. et al. The mechanism about key and credential on trusted computing platform and the application study. Wuhan Univ. J. Nat. Sci. 11, 1641–1644 (2006). https://doi.org/10.1007/BF02831840
Received:
Issue Date:
DOI: https://doi.org/10.1007/BF02831840