DocumentCode :
3039027
Title :
A log-based key authorization management scheme for trusted computing platform
Author :
Cheng, Song ; Weiping, Peng ; Xinji, Tian
Author_Institution :
Sch. of Comput. Sci. & Technol., Henan Polytech. Univ., Jiaozuo, China
Volume :
3
fYear :
2012
fDate :
25-27 May 2012
Firstpage :
513
Lastpage :
516
Abstract :
One of the important technologies in trusted computing is secure storage. The key management is one of the important technologies in secure storage. However, there is a key synchronization problem in the existing key authorization management mechanism for Trusted Computing Platform. To solve the problem, we propose a log-based key authorization management scheme for trusted computing plaform. The new scheme can effectively enhance the trust and security of the trusted storage through constructing an information log for all the trusted keys.
Keywords :
authorisation; storage management; synchronisation; trusted computing; information log; key synchronization problem; log-based key authorization management scheme; trusted computing platform; trusted storage security; Authorization; Cryptography; Hardware; Secure storage; Software; Synchronization; Authorization Data; Key Synchronization; Log-Based; Trusted Computing Plaform; Trusted Storage;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Computer Science and Automation Engineering (CSAE), 2012 IEEE International Conference on
Conference_Location :
Zhangjiajie
Print_ISBN :
978-1-4673-0088-9
Type :
conf
DOI :
10.1109/CSAE.2012.6273004
Filename :
6273004
Link To Document :
بازگشت