Title :
An Integrity Protection Model for the Keys of Trusted Platform Module
Author :
Xu Shiwei ; Zhang Huanguo
Author_Institution :
Comput. Sch., Wuhan Univ., Wuhan, China
Abstract :
The trusted computing group (TCG) has set down and issued trusted platform module (TPM) specification, and the security of the trusted computing system relies on the security of TPM. In this paper, the relationship between the keys inside TPM and TPM users has been established by analyzing the access control mechanism of TPM. The fact that a malignant user of a child key can break the integrity of the parent key has been found. Without changes of the physical TPM structure, a security model of protecting the integrity of the inner key of TPM has been set up. This model introduces BIBA in addition to the original access control mechanism of the inner keys of TPM. Both the integrity security constraint and the access control mechanism have been implemented to enhance the security of the trusted computing system.
Keywords :
authorisation; access control; integrity protection model; security; trusted computing system; trusted platform module; Access control; Cancer; Computer security; Force measurement; Hardware; Information security; Laboratories; Linux; Protection; Software engineering;
Conference_Titel :
Computational Intelligence and Software Engineering, 2009. CiSE 2009. International Conference on
Conference_Location :
Wuhan
Print_ISBN :
978-1-4244-4507-3
Electronic_ISBN :
978-1-4244-4507-3
DOI :
10.1109/CISE.2009.5365804