Netinfo Security ›› 2016, Vol. 16 ›› Issue (7): 78-84.doi: 10.3969/j.issn.1671-1122.2016.07.012

• Orginal Article • Previous Articles     Next Articles

Research on Trusted Security Host Architecture Based on Trusted Computing Base

Qiang HUANG, Le CHANG, Dehua ZHANG, Lunwei WANG   

  1. Information Assurance Technology Laboratory, Beijing 100072, China
  • Received:2016-04-15 Online:2016-07-20 Published:2020-05-13

Abstract:

Starting from the host computer security architecture studying background and the requirement of designing actual high-security computer, we discuss trusted & security union architecture here to fuse trusted computing mechanism with legacy security mechanism like access control or authentication. First, the relationship between trusted computing and legacy security architecture is discussed. The TCG architecture and China trusted computing architecture is also compared with their differences in data integrity and system integrity. At last, we make the conclusion that trusted computing mechanism can enhance the security architecture and assurance the TCB’s characters. Several critical mechanisms are discussed to help for realizing and supporting this architecture: authentication with trusted computing devices and other legacy methods, data protecting mechanism supported by trusted computing and file execution control mechanism combining trusted validation control and mandatory access control.

Key words: security architecture, trusted computing, trusted computing base

CLC Number: