Computer Engineering and Applications ›› 2007, Vol. 43 ›› Issue (29): 1-3.

• 博士论坛 • Previous Articles     Next Articles

Research of trust transfer of applications model

WANG Fei1,LIU Wei-peng2,SHEN Chang-xiang3   

  1. 1.The PLA Information Engineering University,Zhengzhou 450004,China
    2.The State Key Laboratory of Information Security,Graduate University of CAS,Beijing 100039,China
    3.College of Computer Science,Beijing University of Technology,Beijing 100022,China
  • Received:1900-01-01 Revised:1900-01-01 Online:2007-10-11 Published:2007-10-11
  • Contact: WANG Fei

应用可信传递模型研究

王 飞1,刘威鹏2,沈昌祥3   

  1. 1.解放军信息工程大学 电子技术学院,郑州 450004
    2.中国科学院 研究生院 信息安全实验室,北京 100039
    3.北京工业大学 计算机学院,北京100022
  • 通讯作者: 王 飞

Abstract: Operations of applications and services are the base on which terminal users work.And how to protect their secure and trusted action is a hot and difficult point of information security research nowadays.According to trusted computing,paper puts forward Trust Transfer of Applications Model(TTAM),and it can provide that trust transfers in the environment of applications.The model can completely avoid applications being infected and malicious codes spreading out,not by testing the characters of virus.So it can radically protect that applications and services are trusted and provide application environment is trust.

Key words: applications of terminal, trusted list, transfer, malicious code

摘要: 应用、服务等操作是终端用户日常工作的基础,如何保证它们能够是安全、可信的行为,是当前信息安全研究的一个热点和难点。文章利用可信计算的观点建立终端的应用可信传递模型,能够保证信任在应用环境中的传递。该模型能够不依赖于对病毒特征的检测,彻底地防止恶意代码在应用环境中的感染和传播,从根本上保障应用、服务的可信,保障终端应用环境的可信。

关键词: 终端应用, 信任链, 传递, 恶意代码