Full-Text Search:
Home|Journal Papers|About CNKI|User Service|FAQ|Contact Us|中文
《Computer Engineering》 2009-06
Add to Favorite Get Latest Update

Platform Integrity Attestation Based on Time

XU Guo-yu, CHANG Chao-wen, HUANG Jian, GU Dong-dong (Institute of Electronic Technology, PLA Information Engineering University, Zhengzhou 450004)  
The conventional protocol of platform attestation has passivity and cheat problem in practice because of using nonce. This paper proposes platform attestation based on time, which uses transport session associating attestation with time in application layer. Equipment can upload attestation report actively on time and record log in the situation of network disconnection.
【Fund】: 国家“863”计划基金资助项目(2007AA01Z479)
【CateGory Index】: TP393.07
Download(CAJ format) Download(PDF format)
CAJViewer7.0 supports all the CNKI file formats; AdobeReader only supports the PDF format.
【References】
Chinese Journal Full-text Database 3 Hits
1 Qiu Gang1 Liu Zhidu2 Zhou Lihua1(1 The CNIS Key Laboratory of the Education Ministry,Xidian University,Xi′an 710071,China;2 College of Computer and Information Technology,Nanyang Normal University,Nanyang 473061,Henan China);Remote attestation scheme based on Merkle tree[J];Journal of Huazhong University of Science and Technology(Nature Science Edition);2010-04
2 WANG Ning,WU Zhen-qiang,FU Xiang-ping(College of Computer Science,Shaanxi Normal University,Xi'an 710062,China);Dynamic remote attestation model in real-time monitoring[J];Application Research of Computers;2011-05
3 CHI Ya-ping1,QI You-jun1,2,WEI Zhan-zhen1,FANG Yong1(1.Department of Communication,Beijing Electronic and Science Technology Institute,Beijing 100070,China;2.School of Communication,Xidian University,Xi’an 710071,China);Design of trusted signature system based on TCM[J];Computer Engineering and Design;2011-07
【Co-citations】
Chinese Journal Full-text Database 9 Hits
1 LIU Wan1 TAN Ming2 CHEN Xing-Shu3(Institute of Electronic Technology,the PLA Information Engineering University,Zhengzhou 450004)1(The 7227th Mail Box,Beijing 100072)2 (Collge of Computer,Sichuan University,Chengdu 610064)3;Security Analysis and Improvement of the TPM's Two Main Authorization Protocols[J];Computer Science;2008-03
2 SHI Wen-chang1,2,3 SHAN Zhi-yong1,2 LIANG Bin1,2 LIANG Zhao-hui1,2 DONG Ming1,2(Information Security Group,Key Lab of DEKE,Renmin University of China,Beijing 100872,China)1(School of Information,Renmin University of China,Beijing 100872,China)2(Graduate University,Chinese Academy of Sciences,Beijing 100049,China)3;Approach for Research on Fine-grained Chain of Trust[J];Computer Science;2008-09
3 Luo Fang Xu Ning Zhou Yanzhou Liu Xuefeng(College of Electronic Technology,PLA Information Engineering University,Zhengzhou 450004,Henan,China);ANALYSIS AND IMPROVEMENT ON OBJECT ACCESS AUTHORIZATION PROTOCOL IN TRUSTED COMPUTING[J];Computer Applications and Software;2008-12
4 LUO Xu-fu,LUO Yuan(Dept.of Computer Science and Engineering,Shanghai Jiaotong University,Shanghai 200240,China);Research on Virtual Machine System Security Protocols Based on TPM[J];Computer and Modernization;2013-07
5 WEN Bo-wei,WU Zhen-qiang,ZHANG Li-juan(School of Computer Science,Shaanxi Normal University,Xi'an 710062,China);Design and implementation of Kerberos protocol under trusted computing platform[J];Computer Engineering and Design;2013-06
6 ZHAN Jing1 ZHANG Huanguo1,2,3 XU Shiwei1 XIANG Shuang1(1 School of Computer,Wuhan University,129 Luoyu Road,Wuhan 430079,China)(2 State Key Lab of Software Engineering,Wuhan University,Luojia Hill,Wuhan 430072,China)(3 Key Laboratory of Aerospace Information Security and Trusted Computing,Ministry of Education,Wuhan University,129 Luoyu Road,Wuhan 430079,China);Research on TPM Based on State Machine Theory[J];Geomatics and Information Science of Wuhan University;2008-10
7 HUANG Ningyu1 ZHANG Xing1(1 School of Computer Science and Technology,Beijing University of Technology,100 Pingleyuan,Chaoyang District,Beijing 100124,China);Analysis and Improvement of Delegation Mechanism in a Trusted Computing Platform[J];Geomatics and Information Science of Wuhan University;2010-05
8 ZHANG Qian-ying,ZHAO Shi-jun,FENG Deng-guo(Institute of Software,Chinese Academy of Sciences,Beijing 100190,China);Security Analysis and Research on TPM Migratable Key[J];Journal of Chinese Computer Systems;2012-10
9 XU Yang;ZHAO Bo;Milan·Heinayati;YU Fajiang;School of Computer,Wuhan University;Key Laboratory of Aerospace Information Security and Trusted Computing of Ministry of Education,Wuhan University;Distance Learning College,Xinjiang Radio and TV University;;Security Risk and Improved Scheme for TPM 2.0 Policy Authorization[J];Journal of Wuhan University(Natural Science Edition);2014-06
【Co-references】
Chinese Journal Full-text Database 10 Hits
1 HUANG Chen,LI Zhong-xian,YANG Yi-xian,XU Guo-sheng(Information Security Center,Beijing University of Posts and Telecommunications,Beijing 100876,China);A New Web Single Sign-on Scheme Supporting the Multiple Authentication Modes[J];Journal of Beijing University of Posts and Telecommunications;2006-05
2 HE Yin-sheng,GAO Jun,LOU Jing-yi(Department of Electronic Engineering,Naval University of Engineering,Wuhan 430033,China);Design and Realization of a PCI Sampling Card Based on SOPC[J];Telecommunication Engineering;2009-07
3 ZHOU Ming-tian~1 TAN Liang~2 (1.School of Computer Science and Engineering,Univ.of Electron.Sci.& Tech.of China Chengdu 610054; 2.Software Key Lab.of Sichuan Province,Sichuan Normal University Chengdu 610066);Progress in Trusted Computing[J];Journal of University of Electronic Science and Technology of China;2006-S1
4 LIU Zhi-hua (College of Software Engineering ,Southeast University ,Nanjing ,Jiangsu 211100, China);Research of Trusted Computing Platform[J];Computer Security;2009-07
5 SHI Wen-chang,LIANG Hong-liang,SUN Yu-fang (Institute of Software,The Chinese Academy of Sciences,Beijing 100080,China);On Scheme for Dynamic Determination of Subject's Current Sensitivity Label[J];Acta Electronica Sinica;2001-08
6 LI Xiao-yong1,ZUO Xiao-dong2,SHEN Chang-xiang3(1.Beijing Jiaotong University,Beijing 100044,China;2.Graduate School of CAS,Beijing 100049,China;3.Beijing University of Technology,Beijing 100022,China);System Behavior Based Trustworthiness Attestation for Computing Platform[J];Acta Electronica Sinica;2007-07
7 SI Tian-ge,TAN Zhi-yong,LIU Duo,DAI Yi-qi (Department of Computer Science and Technology,Tsinghua University,Beijing 100084,China);A Noninterference Model Based on Actions for Nondeterministic Systems[J];Acta Electronica Sinica;2008-11
8 CAI Yong-quan,LIU Fang(College of Computer Science and Technology,Beijing University of Technology,Beijing 100124,China);DMSS-Dynamic Merkle Authentication-tree Signature[J];Acta Electronica Sinica;2009-S1
9 TAN Liang1,2,LIU Zhen3,ZHOU Ming-tian3(1.Key Lab of Visualization in Scientific Computing and Virtual Reality of Sichuan,College of Computer,Sichuan Normal University,Chengdu,Sichuan 610068,China;2.Institute of Computing Technology,Chinese Academy of Sciences,Beijing,100190,China;3.School of Computer Science and Engineering,University.of Electronic Science and Technology.of China,Chengdu,Sichuan 610054,China);Development of Attestation in TCG[J];Acta Electronica Sinica;2010-05
10 Liu Zi-wen①② Feng Deng-guo② ①(Department of Electronic Engineering and Information Science,University of Science and Technology of China, Hefei 230027,China) ②(State Key Laboratory of Information Security,Institute of Software,Chinese Academy of Sciences, Beijing 100190,China);TPM-Based Dynamic Integrity Measurement Architecture[J];Journal of Electronics & Information Technology;2010-04
【Secondary References】
Chinese Journal Full-text Database 3 Hits
1 WU Shao-jie 1,HE Rong-yu 1,XUE Chang-song 2,XIE Jiang-tao 1(1.Institute of Electronic Technology,Information Engineering University,Zhengzhou 450004,China;2.Chengdu 95879 Army,Chengdu 610081,China);Study and implementation of software guards' security dynamic testing model[J];Application Research of Computers;2012-08
2 Ma Weidong,Wang Zhiying(Institute of Electronic Engineering,CAEP,Mianyang 621900,China);Design of FSM Based General Architecture for Field Control System and Remote Control Protocol[J];Computer Measurement & Control;2013-05
3 Liao Na (Xi'an International University Shaanxi Xi'an 710077);Construction of the trusted platform module in embedded system[J];Electronic Test;2013-08
【Secondary Citations】
Chinese Journal Full-text Database 2 Hits
1 JING Ji-wu1, FENG Deng-guo1,2 1(State Key Laboratory of Information Security, Graduate School, The Chinese Academy of Sciences, Beijing 100039, China); 2(State Key Laboratory of Information Security, Institute of Software, The Chinese Academy of Sciences;An Intrusion Tolerant CA Scheme[J];Journal of Software;2002-08
2 YU Fa-jiang, ZHANG Huan-guo(School of Computer, Wuhan University, Wuhan 430072, Hubei, China);Realization of Trusted Computing Platform[J];Wuhan University Journal(Natural Science Edition);2004-01
©2006 Tsinghua Tongfang Knowledge Network Technology Co., Ltd.(Beijing)(TTKN) All rights reserved