Search Results: 1 - 10 of 100 matches for " "
All listed articles are free for downloading (OA Articles)
Page 1 /100
Display every page Item
Code Attestation with Compressed Instruction Code  [PDF]
Benjamin Vetter,Dirk Westhoff
Computer Science , 2011,
Abstract: Available purely software based code attestation protocols have recently been shown to be cheatable. In this work we propose to upload compressed instruction code to make the code attestation protocol robust against a so called compresssion attack. The described secure code attestation protocol makes use of recently proposed microcontroller architectures for reading out compressed instruction code. We point out that the proposed concept only makes sense if the provided cost/benefit ratio for the aforementioned microcontroller is higher than an alternative hardware based solution requiring a tamperresistant hardware module.
Bilinear Parings in Property-based attestation  [cached]
Ting Chen,Huiqun Yu
Journal of Computers , 2011, DOI: 10.4304/jcp.6.2.297-304
Abstract: One of the objectives of trusted computing is to provide remote attestation method that is able to confirm the status of remote platform or application. Existing property-based attestation is based on the strong-RSA assumption and the required key length is too long. What’s more, a considerable number of RSA-length operations having to be performed which lead to low computational efficiency. Bilinear parings-Based Attestation model, which based on elliptic curve discrete logarithm bilinear paring, can shorten the required key length and reduce bandwidth usage at the same premise of safety performance requirements, as well as ensure platform configurations not to be exposed to the platform while improving operating efficiency. On the other hand, the model includes many trusted computing platform parameters in order to resist replay attacks, and take use of information hiding technology to hide certificates and effectively preventing anyone with a source of certificate misuse of the certificate.
An Analysis of the CAVES Attestation Protocol using CPSA  [PDF]
John D. Ramsdell,Joshua D. Guttman,Jonathan K. Millen,Brian O'Hanlon
Computer Science , 2012,
Abstract: This paper describes the CAVES attestation protocol and presents a tool-supported analysis showing that the runs of the protocol achieve stated goals. The goals are stated formally by annotating the protocol with logical formulas using the rely-guarantee method. The protocol analysis tool used is the Cryptographic Protocol Shape Analyzer.
Trusted Attestation Architecture on an Infrastructure-as-a-Service  [PDF]
Xin Jin,Xingshu Chen,Cheng Zhao,Dandan Zhao
- , 2017, DOI: 10.23919/TST.2017.8030536
Abstract: Trusted attestation is the main obstruction preventing large-scale promotion of cloud computing. How to extend a trusted relationship from a single physical node to an Infrastructure-as-a-Service (IaaS) platform is a problem that must be solved. The IaaS platform provides the Virtual Machine (VM), and the Trusted VM, equipped with a virtual Trusted Platform Module (vTPM), is the foundation of the trusted IaaS platform. We propose a multi-dimensional trusted attestation architecture that can collect and verify trusted attestation information from the computing nodes, and manage the information centrally on a cloud management platform. The architecture verifies the IaaS’s trusted attestation by apprising the VM, Hypervisor, and host Operating System’s (OS) trusted status. The theory and the technology roadmap were introduced, and the key technologies were analyzed. The key technologies include dynamic measurement of the Hypervisor at the process level, the protection of vTPM instances, the reinforcement of Hypervisor security, and the verification of the IaaS trusted attestation. A prototype was deployed to verify the feasibility of the system. The advantages of the prototype system were compared with the Open CIT (Intel Cloud attestation solution). A performance analysis experiment was performed on computing nodes and the results show that the performance loss is within an acceptable range.
Behavior-based Attestation of Policy Enforcement among Trusted Virtual Domains  [cached]
Rong-wei Yu,Fan Yin,Jin Ke,Lina Wang
Journal of Networks , 2010, DOI: 10.4304/jnw.5.6.642-649
Abstract: With serious situation of data leakage in many enterprises, sensitive dataflow protection based on Trusted Virtual Domains (TVD) has been gradually paid much attention to. Remote attestation among two or more entities across trusted virtual domains is an important means to ensure sensitive dataflow. According to behavior compliance, this paper proposes a behavior-based attestation of policy enforcement for distributed services in trusted virtual machine, which is adapted to trusted virtual domain. In our attestation, the unified behavior of the policy model is attested rather than that of any individual security policy. The advantage of this approach is that it is not tied to any specific type of security policy, and it addresses the verification when security policies in two individual virtual domains are inconsistent. Besides, the approach easily extends remote attestation to others’ behavior.
Direct Anonymous Attestation for Next Generation TPM
Xiaofeng Chen,Dengguo Feng
Journal of Computers , 2008, DOI: 10.4304/jcp.3.12.43-50
Abstract: Trusted computing platforms have been proposed as a promising approach to enhance the security of general-purpose computing systems. Direct Anonymous Attestation(DAA) is a scheme that allows a Trusted Platform Module (TPM) which is the core component of the trusted computing platform to remotely convince a communication partner that it is indeed a Trusted Platform Module while preserving the user’s privacy. The first DAA scheme developed by Brickell which is relatively complex and time-consuming was adopted by the current TPM specification.As the ECC cryptosystem is more efficient compared to the RSA cryptosystem, more and more cryptographic device is based on the ECC cryptosystem, so it is anticipated that the TPM will be based on the ECC in near future. In this paper, we propose a new direct anonymous attestation which is suitable for the ECC-based TPM. This paper presents an efficient construction that implements all anonymous authentication features specified in DAA. The proposed scheme has the best computational performance of all the DAA schemes up to now. The new DAA scheme is provably secure in the random oracle model under the q- SDH and the decisional Diffie-Hellman assumption.
Software Behavior Based Trustworthiness Attestation For Computing Platform  [cached]
Peiqiang Chen
Journal of Software , 2012, DOI: 10.4304/jsw.7.1.55-60
Abstract: With a prevalence of pervasive computing, especially cloud computing , the software is at the core and play a vital role. This advance the security problem, so software trust is drawing increasing attention. Therefore, we need a unified trust relationship model between entities, which captures both the needs of the traditional computing world and the world of pervasive computing where the continuum of trust is based on identity, physical context or a combination of both. Here, we presents a software behavior based attestation model which try to determine the trust state of attesting platform from its system trust related behaviors. The new attestation model has advantages of privacy protection and high feasibility. In addition, it can also help to control and limit the impacts of security accidents such as malicious code in system. This paper also proposes a trust framework for service oriented application and displays its formalization model. It is useful for designing trust and reliable system and helpful for software developer’s analysis and validation of the application.
龚自珍的“私”论探析  [PDF]
湖南工业大学学报(社会科学版) , 2013,
Abstract: 龚自珍一反先公后私的传统,提出了“私”论,认为人皆有私,分别从认识论领域和伦理道德领域对传统公私观进行诘难。其主张在对传统道统的反击和对个人价值及个人意志的凸显等方面有着积极的意义,使得“公私之辨”具有强烈的时代气息和近代人文色彩,对“古今中西”之争及挽救时局和民族的命运都有着重大的意义。然而,由于多种因素的存在,龚自珍论私没有阐明什么是私,也没有论及私产生的原因和公私的相对性,使得龚自珍的私论有失严谨,对后世公私关系的正确走向产生一定的不利影响。
泻黄散儿科难病治验  [PDF]
中国中医药信息杂志 , 1999,
Abstract: 泻黄散出自宋?钱乙《小儿药证直决》。由藿香、生石膏、栀子、防风、甘草五味中药组成。原方为脾热弄舌而设,具有清泻脾胃伏火之功。笔者临证以此方灵活加减治疗小儿皮肤粘膜淋巴结综合征、乙型肝炎、过敏性紫癜等多种儿科疑难杂病,每获良效,现举验案如下。
余瀛鳌教授临证治验漫谈  [PDF]
中国中医药信息杂志 , 1999,
Abstract: 业师余瀛鳌教授出身于中医世家,40余年来,将自己的全部精力投注于中医药事业中。笔者随导师临证,倍感余师深得轩歧精华,对疑难杂证每能立起沉疴。余师治病重在圆机活法,强调情志因素致病的重要性,主张辨病与辨证相结合,对于每一病证都在通治方基础上加减施治。赞同先贤“一病有主方,一方有主药”之说,药用简便廉验,经方对方择善而从。
Page 1 /100
Display every page Item

Copyright © 2008-2017 Open Access Library. All rights reserved.