Netinfo Security ›› 2015, Vol. 15 ›› Issue (9): 70-73.doi: 10.3969/j.issn.1671-1122.2015.09.017

• Orginal Article • Previous Articles     Next Articles

Research on Trusted Computing Device Virtualization Critical Assurance Mechanisms

Qiang HUANG(), De-hua ZHANG, Lun-wei WANG   

  1. Information Assurance Technology Laboratory, Beijing 100072, China
  • Received:2015-07-15 Online:2015-09-01 Published:2015-11-13

Abstract:

This paper analyzes the virtualization requirements of trusted computing hardware device, and studies the virtual support mode and assurance mechanism, and puts forward two principles of key independent principle and complete state independent principle that are needed when constructs trusted computing mechanism on virtual platform. On the basis of analyzing virtualization mechanisms of the main I/O equipments, this paper also puts forward two key virtualization assurance mechanisms of trusted computing hardware device: to ensure the secure inter-domain communication in the virtualization software layer; to ensure the trusted computing hardware device has an expandable internal storage space.

Key words: trusted computing, virtualization, assurance mechanism

CLC Number: