An Analysis about the Security of the Operating System Trusted Platform
暂无分享,去创建一个
To enhance the security of the detection system of core files, it is suggested in this article a trusted computing platform to protect the confidentiality, integrity and availability of the resources of the system. This article first gives an analysis to the structure and organizational relationships of trusted computing module in Vista operating system. Then it suggests a general structure of typical trusted computation platform, whose major function module also receives a detailed analysis. This article attaches much importance to the analysis about TPM, and gives a detailed analysis to its internal structure and its support for system safety. Through the analysis of the security of the TPM’s internal structure, it is proven that the security of TPM can be safeguarded, and a set of complete, reliable trusted transmission mechanism is necessary for this.
[1] Zhou Li-hua. Study on the Interoperability of DRM Based on Trusted Computing , 2009 .
[2] Jay BloomBecker,et al. International computer crime: Where terrorism and transborder data flow meet , 1982, Comput. Secur..