可信終端在電子政務(wù)網(wǎng)中的應(yīng)用研究
[Abstract]:In recent years, with the increasing expansion of network scale and the continuous innovation of technology, the network structure becomes more complex, and the network information security problems become increasingly prominent. The security and reliability of network defense system are facing more and more serious challenges. People gradually realize that to prevent network intrusion, data leakage should be investigated for its root cause-terminal, and terminal equipment on the edge of network is the initiator of most security hidden trouble. Therefore, the establishment of a complete and compatible terminal security system has great application value and practical significance. Especially, it is more important to form a set of high reliability security mechanism for the special network (e-government network) which requires high information security management. Based on the basic characteristics of the current network environment, this paper analyzes the Xen virtualization technology in allusion to the shortcomings and limitations of the traditional security solutions, which mostly rely on the third party application software. On the basis of deeply studying the working principle of trusted chip TPM (Trusted Platform Module) and the mechanism of chain of trust transfer, a virtual client system (terminal system) trusted booting mechanism based on virtualization technology is proposed. In order to solve the problem of excessive reliance on third-party security software limitations. On the basis of TNC (Trusted Network Connect) architecture, combining the characteristics of TPM trusted chip and virtualization technology in trusted computing system, this paper studies the privilege domain of virtual machine and the transfer mechanism of trust chain in TPM chip. The trusted boot process from TPM hardware to privilege domain is extended to the virtual client terminal, which improves the trusted boot security mechanism and realizes the trusted security of the terminal. The aim of this paper is to perfect the network security management system, to ensure the credibility and security of the terminal, to realize the trust chain transfer mechanism from the terminal security to the whole network security trust, and finally to achieve the goal of network information security.
【學(xué)位授予單位】:長(zhǎng)安大學(xué)
【學(xué)位級(jí)別】:碩士
【學(xué)位授予年份】:2014
【分類(lèi)號(hào)】:TP393.08
【參考文獻(xiàn)】
相關(guān)期刊論文 前9條
1 張曉菲;許訪;沈昌祥;;基于可信狀態(tài)的多級(jí)安全模型及其應(yīng)用研究[J];電子學(xué)報(bào);2007年08期
2 張淼;徐國(guó)愛(ài);胡正名;楊義先;;可信計(jì)算環(huán)境下基于主機(jī)身份的一次性密鑰交換協(xié)議[J];電子與信息學(xué)報(bào);2007年06期
3 鄭宇;何大可;何明星;;基于可信計(jì)算的移動(dòng)終端用戶認(rèn)證方案[J];計(jì)算機(jī)學(xué)報(bào);2006年08期
4 趙波;張煥國(guó);李晶;陳璐;文松;;可信PDA計(jì)算平臺(tái)系統(tǒng)結(jié)構(gòu)與安全機(jī)制[J];計(jì)算機(jī)學(xué)報(bào);2010年01期
5 肖政;韓英;葉蓬;侯紫峰;;基于可信計(jì)算平臺(tái)的體系結(jié)構(gòu)研究與應(yīng)用[J];計(jì)算機(jī)應(yīng)用;2006年08期
6 譚興烈;可信計(jì)算平臺(tái)中的關(guān)鍵部件TPM[J];信息安全與通信保密;2005年02期
7 孔維廣;可信計(jì)算平臺(tái)的工作原理與應(yīng)用研究[J];武漢科技學(xué)院學(xué)報(bào);2003年06期
8 秦戈;韓文報(bào);;關(guān)于可信計(jì)算平臺(tái)模塊的研究[J];信息工程大學(xué)學(xué)報(bào);2006年04期
9 肖曦;韓軍;汪倫偉;;可信計(jì)算平臺(tái)關(guān)鍵機(jī)制研究[J];信息工程大學(xué)學(xué)報(bào);2007年02期
本文編號(hào):2245339
本文鏈接:http://sikaile.net/guanlilunwen/ydhl/2245339.html