Abstract
The specification of Trusted Computing requires that all the components running on trusted computing platform should be trusted, which has seriously hampered the application of trusted computing platform. This paper presents a flexible trusted terminal model of tolerance non-trusted components. Compared with the existing trusted computing platform, the model allows the existence of non-trusted components, in the mean time it can also guarantee the predictable and controllable of security result. The model is divided into trusted domain and non-trusted domain of tolerance non-trusted components. Based on the noninterference theory of information flow and the noninterference theory of interdomain, the paper presents the tolerance mechanism of non-trusted components and derives the sufficient condition that the trusted terminal should meet. On this basis, the specific physical model design is given and the model is proved to be a trusted terminal model.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Trusted Computing Group. TNC Architecture for Interoperability (2003), http://www.trustedcomputinggroup.org/resources/tnc_architecture_for_interoperability_version_13
Li, X.Y., Zuo, X.D., Shen, C.X.: System Behavior Based Trustworthiness Attestation for Computing Platform. Acta Electronica Sinica 35(7), 1234–1239 (2007) (in Chinese)
Wang, S.H., Li, X.Y.: Policy Based Trustworthiness Attestation for Computing Platform. Acta Electronica Sinica 37(4), 900–904 (2009) (in Chinese)
Intel. Intel Trusted Execution Technology (2007), http://www.intel.com/technology/security/downloads/TrustedExec_Overview.pdf
Microsoft Coporation, Next-Generation Secure Computing Base (2003), http://www.microsoft.com/res-ources/ngscb/default.mspx
Liu, F.Y.: JetWay trusted computing platform. Netinfo Security 11, 23–25 (2006)
Shen, C.X.: Building up Active-defending Infsec Assurance Framework Based on Trusted Platform. Information Secruity and Communications Privacy 9, 17–19 (2004)
Zhang, H.G., Luo, J., Jin, G.: Development of Trusted Computing Research. Journal of Whuan University (Natural Science Edition) 52, 513–518 (2006)
Department of Defense Computer Security Center.DoD 5200. 282STD. Department of Defense Trusted Computer System Evaluation Criteria. USA:DOD (1985)
Abrams, M.D., Joyce, M.V.: Trusted system concepts. Computers & Security 14, 45–56 (1995)
Trusted Computing Group. TCG Specification Architecture Overview (2011), http://www.trustedcomputinggroup.org/resourcestcg_architecture_overview_version_14
Trusted Computing Group. Infrastructure Work Group Integrity Report Schema Specification (2011), http://www.trustedcomputinggroup.org/resources/infrastructure_work_group_integrity_report_schema_specification_version_10
Zhou, M.H., Mei, H.: Research and development of Trusted Computing. Computer Science 31, 5–8 (2004)
Goguan, J.A., Meseguern, J.: Security Policies and Security Model. In: The 1982 IEEE Symposium on Security and Privacy, Qakland, California, pp. 11–20 (1982)
Noninterference, R.J.: Transitivity, and Channel-Control Security Policies. CSL-92-02. Stanford Research Institute, Menlo Park (1992)
Zhao, J., Shen, C.X., Liu, J.Q.: A Noninterference-Based Trusted chain Model. Journal of Computer Research and Development 45, 974–980 (2008)
Zhang, X., Chen, Y.L., Shen, C.X.: Non-interference Trusted Model Based on Processes. Journal of Communications 30, 6–11 (2009)
Zhao, Y.: The Security Architecture and practical Model for Important Information System. Beijing Jiaotong University, Beijing (2008)
Beijing University of Technology, IWNCOMM, TOPSEC, Trusted Computing Specification—Part 5: The Architecture of Trusted Network Connection (V1.03) (2007)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Chang, C., Qin, X. (2012). Research on Flexible Trusted Terminal Model. In: Lei, J., Wang, F.L., Li, M., Luo, Y. (eds) Network Computing and Information Security. NCIS 2012. Communications in Computer and Information Science, vol 345. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-35211-9_85
Download citation
DOI: https://doi.org/10.1007/978-3-642-35211-9_85
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-35210-2
Online ISBN: 978-3-642-35211-9
eBook Packages: Computer ScienceComputer Science (R0)