DocumentCode :
2595050
Title :
Protection of Program Integrity Based on Trusted Computing
Author :
Ling, Xiang ; Wan, Li ; Wu, Guoqing
Author_Institution :
Sch. of Comput., Wuhan Univ., Wuhan, China
Volume :
2
fYear :
2010
fDate :
24-25 April 2010
Firstpage :
278
Lastpage :
281
Abstract :
Trusted computing has a static solution to protect the system from the threats of incredible program. But few techniques could help to secure those integrities of running programs. This article extends Biba model with the access of execution, proposes integrity protection framework based on trusted platform, and discusses the application of integrity protection on architectures of mainstream platforms.
Keywords :
security of data; Biba model; incredible program threats; program integrity protection framework; static solution; trusted computing; Communication system security; Computer architecture; Computer networks; Computer security; Hardware; Mathematical model; Operating systems; Protection; Read-write memory; Semiconductor device measurement; Biba Model; Integrity Measurement; Integrity Protection; Trusted Computing;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Networks Security Wireless Communications and Trusted Computing (NSWCTC), 2010 Second International Conference on
Conference_Location :
Wuhan, Hubei
Print_ISBN :
978-0-7695-4011-5
Electronic_ISBN :
978-1-4244-6598-9
Type :
conf
DOI :
10.1109/NSWCTC.2010.200
Filename :
5480655
Link To Document :
بازگشت