Netinfo Security ›› 2017, Vol. 17 ›› Issue (4): 9-14.doi: 10.3969/j.issn.1671-1122.2017.04.002

• Orginal Article • Previous Articles     Next Articles

Centralized and Unified Trusted Computing Platform Management Model and Its Application

Qiang HUANG1(), Gaojian WANG1, Wenzhi MI2, Lunwei WANG1   

  1. 1. Information Assurance Technology Laboratory, Beijing 100072, China
    2. 78111 Military Unit, Chengdu Sichuan 610000, China
  • Received:2017-03-15 Online:2017-04-20 Published:2020-05-12

Abstract:

Trusted computing technology extend the capacity of IT security management. The traditional security management models or trust management models are not fit for trusted computing platforms. A centralized and unified trusted computing platform management model called CUTM based on the integrity verifying ability of trusted computing technology is proposed to meet the security requirements of high security level information systems. It has the advantages of separated management roles and unified integrity policy. So it can support various kinds of trusted computing hardware devices and platforms. Its essential contents and relationships with other legacy security management systems are analyzed in this thesis. At last, this model is compared with TCG-defined management model.

Key words: IT security management, trusted computing, management model

CLC Number: