DocumentCode
2894702
Title
Design and Implementation of Security Operating System Based on Trusted Computing
Author
Nie, Xiao-wei ; Feng, Deng-Guo ; Che, Jian-jun ; Wang, Xin-pu
Author_Institution
State Key Lab. of Inf. Security, Chinese Acad. of Sci., Beijing
fYear
2006
fDate
13-16 Aug. 2006
Firstpage
2776
Lastpage
2781
Abstract
According to analyzing and researching the concept and structure of trusted computing, this paper reviews the relative work of security operating system based on trusted computing. Then a security model based on trusted computing IBLP is advanced through the improvement of a classical security model BLP. The overall design scheme and modularized implementation of a secure operating system for trusted computing is presented on the base of the above work. Finally, the experiment result indicates the effectiveness and feasibility of our system
Keywords
operating system kernels; security of data; IBLP; classical security model BLP; security operating system; trusted computing; Application software; Channel hot electron injection; Computer aided manufacturing; Computer networks; Computer security; Cryptography; Cybernetics; Hardware; IP networks; Information security; Laboratories; Machine learning; Operating systems; Trusted computing; access control; security model; security operating system;
fLanguage
English
Publisher
ieee
Conference_Titel
Machine Learning and Cybernetics, 2006 International Conference on
Conference_Location
Dalian, China
Print_ISBN
1-4244-0061-9
Type
conf
DOI
10.1109/ICMLC.2006.258997
Filename
4028533
Link To Document