Skip to main content

Research on Flexible Trusted Terminal Model

  • Conference paper
Network Computing and Information Security (NCIS 2012)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 345))

Included in the following conference series:

  • 1332 Accesses

Abstract

The specification of Trusted Computing requires that all the components running on trusted computing platform should be trusted, which has seriously hampered the application of trusted computing platform. This paper presents a flexible trusted terminal model of tolerance non-trusted components. Compared with the existing trusted computing platform, the model allows the existence of non-trusted components, in the mean time it can also guarantee the predictable and controllable of security result. The model is divided into trusted domain and non-trusted domain of tolerance non-trusted components. Based on the noninterference theory of information flow and the noninterference theory of interdomain, the paper presents the tolerance mechanism of non-trusted components and derives the sufficient condition that the trusted terminal should meet. On this basis, the specific physical model design is given and the model is proved to be a trusted terminal model.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Trusted Computing Group. TNC Architecture for Interoperability (2003), http://www.trustedcomputinggroup.org/resources/tnc_architecture_for_interoperability_version_13

  2. Li, X.Y., Zuo, X.D., Shen, C.X.: System Behavior Based Trustworthiness Attestation for Computing Platform. Acta Electronica Sinica 35(7), 1234–1239 (2007) (in Chinese)

    Google Scholar 

  3. Wang, S.H., Li, X.Y.: Policy Based Trustworthiness Attestation for Computing Platform. Acta Electronica Sinica 37(4), 900–904 (2009) (in Chinese)

    Google Scholar 

  4. Intel. Intel Trusted Execution Technology (2007), http://www.intel.com/technology/security/downloads/TrustedExec_Overview.pdf

  5. Microsoft Coporation, Next-Generation Secure Computing Base (2003), http://www.microsoft.com/res-ources/ngscb/default.mspx

  6. Liu, F.Y.: JetWay trusted computing platform. Netinfo Security 11, 23–25 (2006)

    Google Scholar 

  7. Shen, C.X.: Building up Active-defending Infsec Assurance Framework Based on Trusted Platform. Information Secruity and Communications Privacy 9, 17–19 (2004)

    Google Scholar 

  8. Zhang, H.G., Luo, J., Jin, G.: Development of Trusted Computing Research. Journal of Whuan University (Natural Science Edition) 52, 513–518 (2006)

    MATH  Google Scholar 

  9. Department of Defense Computer Security Center.DoD 5200. 282STD. Department of Defense Trusted Computer System Evaluation Criteria. USA:DOD (1985)

    Google Scholar 

  10. Abrams, M.D., Joyce, M.V.: Trusted system concepts. Computers & Security 14, 45–56 (1995)

    Article  Google Scholar 

  11. Trusted Computing Group. TCG Specification Architecture Overview (2011), http://www.trustedcomputinggroup.org/resourcestcg_architecture_overview_version_14

  12. Trusted Computing Group. Infrastructure Work Group Integrity Report Schema Specification (2011), http://www.trustedcomputinggroup.org/resources/infrastructure_work_group_integrity_report_schema_specification_version_10

  13. Zhou, M.H., Mei, H.: Research and development of Trusted Computing. Computer Science 31, 5–8 (2004)

    Google Scholar 

  14. Goguan, J.A., Meseguern, J.: Security Policies and Security Model. In: The 1982 IEEE Symposium on Security and Privacy, Qakland, California, pp. 11–20 (1982)

    Google Scholar 

  15. Noninterference, R.J.: Transitivity, and Channel-Control Security Policies. CSL-92-02. Stanford Research Institute, Menlo Park (1992)

    Google Scholar 

  16. Zhao, J., Shen, C.X., Liu, J.Q.: A Noninterference-Based Trusted chain Model. Journal of Computer Research and Development 45, 974–980 (2008)

    Google Scholar 

  17. Zhang, X., Chen, Y.L., Shen, C.X.: Non-interference Trusted Model Based on Processes. Journal of Communications 30, 6–11 (2009)

    Google Scholar 

  18. Zhao, Y.: The Security Architecture and practical Model for Important Information System. Beijing Jiaotong University, Beijing (2008)

    Google Scholar 

  19. Beijing University of Technology, IWNCOMM, TOPSEC, Trusted Computing Specification—Part 5: The Architecture of Trusted Network Connection (V1.03) (2007)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Chang, C., Qin, X. (2012). Research on Flexible Trusted Terminal Model. In: Lei, J., Wang, F.L., Li, M., Luo, Y. (eds) Network Computing and Information Security. NCIS 2012. Communications in Computer and Information Science, vol 345. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-35211-9_85

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-35211-9_85

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-35210-2

  • Online ISBN: 978-3-642-35211-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics