Loading...
Toggle navigation
Home
About
About Journal
Editorial Board
Author Center
Current Issue
Just Accepted
Archive
Most Read Articles
Most Download Articles
Most Cited Articles
E-mail Alert
RSS
Reader Center
Online Submission
Manuscript Tracking
Instruction
Download
Review Center
Peer Review
Office Work
Editor-in-Chief
Subscription
Contact Us
中文
Table of Content
13 April 2017, Volume 3 Issue 4
Previous Issue
Next Issue
Building Cyber Security Defense by Trusted Computing 3.0
2017, 3(4): 290-298.
Asbtract
(
)
PDF
(1075KB) (
)
Related Articles
|
Metrics
An Overview of Trusted Computing Structure Specification
2017, 3(4): 299-304.
Asbtract
(
)
PDF
(4215KB) (
)
References
|
Related Articles
|
Metrics
Power system is an important national infrastructure. Its safe and stable operation is the important guarantee of economic development and national security and stability. Chinas power system has been in safety protection with relevant regulations and requirements of the departments of the state, but the face of the current complex cyberspace security situation, there are still subject to APT and other malicious code attack risk. Trusted computing refers to the calculation of the operation at the same time security, so that the operation and process behavior under any conditions, the results are always the same as expected, the calculation can be measured throughout the control, not interference, is to change the traditional “Kill” the basis of passive defense technology. This paper analyzes the information security risks and challenges faced by the power system. and introduces the research and application of the trusted computing technology in the power system, and gives the recommended prospect for the engineering application of the trusted computing in combination with the actual production situation. Based on the trusted computing technology to build the power information security and immune system, and create an important industrial production control system and information infrastructure in the application of trusted computing technology to achieve high safety level protection of the precedent, the safety of other industries construction is also given worthy of reference and reference to the model.
Cryptographic Service Platform Based on Trusted Computing Technology
2017, 3(4): 305-309.
Asbtract
(
)
PDF
(3854KB) (
)
References
|
Related Articles
|
Metrics
Trusted computing is an active defense and immune security system. In this paper, from practical demands in financial industry and electronic government, we propose a cryptographic service platform based on trusted computing, which supports domesticallymade standard SM1, SM2, SM3, SM4 cryptographic algorithms and uses trusted computing technology to protect cryptographic deices and systems. This platform provides uniform cryptographic computing service, key management and cryptographic devices management etc, and it has excellent reliability, security, efficiency, parallel processing and load balancing. This platform can be applied to financial industry, electronic government and electronic commerce.
The TPCM Platform Measurement and Control Design
2017, 3(4): 310-315.
Asbtract
(
)
PDF
(4044KB) (
)
References
|
Related Articles
|
Metrics
A trusted platform control module (TPCM) and a control method are proposed in this paper.This method is based on keeping the original motherboard design unchanged, and the TPCM is extended on the existed interface of the computer and measures the platform with the root of trust for measurement (RTM).Combined with the realization of the power control, it can solve the source of the boot untrusted problem fundamentally. In terms of keeping the credibility and integrity of the boot code, it checks the boot environment by inserting driver and protected policy into the boot code. If the trusted environment has been destroyed or the device firmware has been malicious tampered, it will enter untrusted operation environment or prevent the computer from been powered on per the security policy, which have been written in the TPCM in advance. The TPCM designed by this method has autonomous and absolute control right to the computer. Once the system out of control occurred caused by malicious code intrusion, the TPCM can protect the computer from been attacked through cut off power and any other absolute protection solutions. It is not only reliable and effective, but also low cost and easy to be installed.
Research and Application of Trusted Software Base
2017, 3(4): 316-322.
Asbtract
(
)
PDF
(4520KB) (
)
References
|
Related Articles
|
Metrics
With the development of information science and technology, trusted computing, as the key technique of cyberspace security, it has become the focus of international cyberspace combat. China is promoting its application in various fields. Trusted software base (TSB), which lies in the kernel of trusted computing architecture, protect upperlevel application and manage lowerlevel trusted platform control module (TPCM) at the same time. In this paper, we describe the function structure, working procedure, supportability and interactive interfaces of TSB by core technology research of trusted software, and introduce its successful application in practical projects. As a whole, TSB serve as the solid foundation of trusted computing technology which can promote its further development.
Research on Key Techniques of Trusted Server Platform in Cloud Environment
2017, 3(4): 323-331.
Asbtract
(
)
PDF
(7035KB) (
)
References
|
Related Articles
|
Metrics
Nowadays, the cloud environment still confronted with a severe challenge on issues of security threats, and trusted platform control module (TPCM) technology provides an effective countermeasure for building a server platform that is secure, proactive, and controllable. To resolve the two completeness issues in TPCMbased server realizations, in this paper we propose a server platform architecture, which is based on TPCM and trusted software base (TSB). Concerning server hardware, we present a poweron timing control scheme that takes outofband management module (OMM) into consideration, and a dedicated scheme for establishing the trust chain. Meanwhile, we illustrate some basic requirements and insights in the realization of virtual root of trust, and we present a solution for virtual root of trust for measurement (VRTM). We also give some discussion on other key techniques including trusted migrations. We believe this work can serve as a practical reference in the design of TPCMbased cloud server platforms.
The Implementation and Application of Trusted Connect Architecture
2017, 3(4): 332-338.
Asbtract
(
)
PDF
(5568KB) (
)
References
|
Related Articles
|
Metrics
With the deep application of computer network, the main threats in network includes malicious code attacks, illegal information theft, data and system illegal destruction and so on. In these threats, malicious code attacks targeting users privacy information becomes the biggest security threat beyond traditional virus. The root of these security threats lies in the lack of architecturelevel computer malicious code attack immune mechanism which can help the computer immune system to prevent malicious code attacks, and make sure the computing network platform operate securely and reliably. Therefore, the technical concept of trusted network connection was proposed. Through establishing a specific mechanism of integrity measurement can achieve platform authentication in addition to the authentication of users identity in network access process. Platform authentication is an effective methods to prevent illegal accessing of untrustworthy platform with malicious code. This paper presents implementation and related supporting technologies of TCA specified in China national standards, and discusses the application of TCA.
A Data Protection Method Based on Trusted Computing in Distributed Storage
2017, 3(4): 339-343.
Asbtract
(
)
PDF
(4230KB) (
)
References
|
Related Articles
|
Metrics
With the advent of the data age, data security has become more and more important. This paper presents a data protection method based on trusted computing technology in distributed storage system. The distributed storage system architecture includes clients, data servers and metadata servers that records or maps data to a real storage node based on a distributed algorithm. The distributed storage system runs data and metadata servers on machines which support trusted computing technology. In order to verify the identity of each server in the storage system and the identity of users, the system adds an authentication center to maintain the trusted status. The authentication center runs on the server with trusted computing functions. The data protection scheme proposed in this paper provides a set of effective protection mechanism based on the trusted computing technology for distributed storage system.
Evaluation of Trusted Cloud Services Based on ThirdParty Regulation
2017, 3(4): 344-352.
Asbtract
(
)
PDF
(6390KB) (
)
References
|
Related Articles
|
Metrics
As a kind of new network services relying on cloud computing platform, cloud services have been widely applied in many areas. However, security risks under the outsourcing service mode and fraudulent activity under “payasyougo” mode also raise trust issues on cloud services. Now, the level of cloud services credibility has become the basis on whether the users tend to migrate their data to the clouds. Considering the current cloud services chaos, this paper proposes a security service valuation model of the controllable cloud computing platform based on the third party supervise and twoway trust. In order to provide both credible and available cloud services for the users, this paper also introduces comprehensive estimation in which the users experience preference depends on analytic hierarchy process and fuzzy mathematics, and ensures the security of the whole cloud computing platform. Experiment shows that the model can not only effectively improve the transaction success rate and the overall level of user satisfaction, but also resist some fraudulent activities caused by malicious entities to some extent.
Research and Application of Trusted Computing in Electric Power System
2017, 3(4): 353-358.
Asbtract
(
)
PDF
(5080KB) (
)
References
|
Related Articles
|
Metrics
Power system is an important national infrastructure. Its safe and stable operation is the important guarantee of economic development and national security and stability. Chinas power system has been in safety protection with relevant regulations and requirements of the departments of the state, but the face of the current complex cyberspace security situation, there are still subject to APT and other malicious code attack risk. Trusted computing refers to the calculation of the operation at the same time security, so that the operation and process behavior under any conditions, the results are always the same as expected, the calculation can be measured throughout the control, not interference, is to change the traditional “Kill” the basis of passive defense technology. This paper analyzes the information security risks and challenges faced by the power system. and introduces the research and application of the trusted computing technology in the power system, and gives the recommended prospect for the engineering application of the trusted computing in combination with the actual production situation. Based on the trusted computing technology to build the power information security and immune system, and create an important industrial production control system and information infrastructure in the application of trusted computing technology to achieve high safety level protection of the precedent, the safety of other industries construction is also given worthy of reference and reference to the model.
Research on Security Protection Architecture for Television Production and Broadcast Network System Based on Trusted Computing
2017, 3(4): 359-363.
Asbtract
(
)
PDF
(10188KB) (
)
References
|
Related Articles
|
Metrics
The network broadcast system of television is an important part of safe broadcast. The broadcast service has the characteristics of high flow, high bandwidth and low latency, and which brings new challenges to the traditional passive defense technologies, just like checking, killing, sealing and blocking. Based on trusted computing technology, this paper presents a security protection architecture with active defense ability for the network broadcast system of television and gives the realization methods of each key technologies, such as trusted measurement, trusted connection and signature verification. The proposed architecture can fundamentally ensure the security and accuracy of TV program production and broadcast, and guarantee the integrity and safe delivery of broadcast or business content. It also provides technical reference for improving the level of security protection of the network broadcast environment of television.
Research of the Application of Trusted Computing in Key Systems of Insurance Industry
2017, 3(4): 364-369.
Asbtract
(
)
PDF
(1799KB) (
)
References
|
Related Articles
|
Metrics
With the rapid growth of informationization in various industries, trusted computing, as the key information security technology, plays an important role in ensuring business security and improving core competence. Trusted computing can build secure environments in information system by process white list mechanism, file access control mechanism, system authorization and dynamic realtime protection mechanism. The paper present methods in building active prevention network system with trusted computing technology by detailed analysis of its application in insurance company.
Application of Safe Independent DecisionMaking and Controllable Product in ICS
2017, 3(4): 370-374.
Asbtract
(
)
PDF
(4361KB) (
)
References
|
Related Articles
|
Metrics
Based on the threats that exist in the ICS network interconnection and communication,host computing environment, centralized management,we introduced an independent decisionmaking and controllability protection system.By designing physical and environmental security, border protection, centralized management, network and communication security, application and data security, the ICS security can be protected comprehensively, and the system is independent decisionmaking and controllability. Also we introduced the application of the independent decisionmaking and controllability product: isolation exchange product. This system is aimed of autonomous controllable ICS security, In the long term, application of trusted computing technology in the ICS is the solution to ICS security.
Construction of Critical Information Infrastructure Protection System Based on?Classifed?Protection?and?Trusted?Computing
2017, 3(4): 375-381.
Asbtract
(
)
PDF
(1036KB) (
)
Related Articles
|
Metrics
我国关键信息基础设施是在国家实行网络安全等级保护制度的基础上实行重点保护,可信计算是一种信息系统安全新技术,包括可信硬件、可信软件、 可信网络和可信计算应用等诸多方面。通过可信计算实现高安全保护等级的信息系统保障技术,包括全程一致访问控制技术、结构化保护技术以及多级互联技术,进而形成纵深防御的安全防护体系,使高安全保护等级信息系统的计算全程可测可控,实现运算和防护并存,构建我国关键信息基础设施保障体系。
The Army Trusted Computing Standard of Civil-Military Integration
2017, 3(4): 382-384.
Asbtract
(
)
PDF
(685KB) (
)
Related Articles
|
Metrics
Author Center
Online Submission
Instruction
Template
Copyright Agreement
Review Center
Peer Review
Editor Work
Editor-in-Chief
Office Work