Title :
An efficient security architecture for trusted computing
Author_Institution :
Coll. of Sci., North Univ. of China, Taiyuan, China
Abstract :
We argued that virtual machine monitor (VMM) is the appropriate architecture for implementing TCG specification With analysis of limitations Trusted Computing Group (TCG) has encountered. Putting together the VMM architecture, TCG hardware and application-oriented ldquothinrdquo virtual machine (VM), Trusted VMM-based security architecture is present in this paper with the character of reduced and distributed trusted computing base (TCB). It provides isolation and integrity guarantees based on which general security requirements can be satisfied.
Keywords :
distributed programming; formal specification; security of data; supervisory programs; virtual machines; distributed trusted computing base; trusted VMM-based security architecture; trusted computing group specification; virtual machine monitor; Computer architecture; Computer security; Educational institutions; Embedded computing; Hardware; Kernel; Operating systems; Privacy; Virtual machine monitors; Virtual machining; security architecture; trusted computing; virtual machine monitor;
Conference_Titel :
Computer Science and Information Technology, 2009. ICCSIT 2009. 2nd IEEE International Conference on
Conference_Location :
Beijing
Print_ISBN :
978-1-4244-4519-6
Electronic_ISBN :
978-1-4244-4520-2
DOI :
10.1109/ICCSIT.2009.5234493