Design and Implementation of Security Operating System Based on Trusted Computing
2006Vol. 15, pp. 2776–2781
Citations Over TimeTop 14% of 2006 papers
Abstract
According to analyzing and researching the concept and structure of trusted computing, this paper reviews the relative work of security operating system based on trusted computing. Then a security model based on trusted computing IBLP is advanced through the improvement of a classical security model BLP. The overall design scheme and modularized implementation of a secure operating system for trusted computing is presented on the base of the above work. Finally, the experiment result indicates the effectiveness and feasibility of our system
Related Papers
- → Research on Trusted Application Environment base on PTM(2014)
- Distributed trusted verification mechanism for trusted computing platform(2012)
- Study on Construction of Trusted Computing Base in Trusted Computing Platform(2012)
- Research of Trusted Computing Platform(2009)
- Study on Trusted Application based on Trusted Computing(2010)