Skip to main content
Log in

A separated domain-based kernel model for trusted computing

  • Trusted Architecture
  • Published:
Wuhan University Journal of Natural Sciences

Abstract

This paper fist gives an investigation on trusted computing on mainstream operation system (OS). Based on the observations, it is pointed out that Trusted Computing cannot be achieved due to the lack of separation mechanism of the components in mainstream OS. In order to provide a kind of separation mechanism, this paper proposes a separated domain-based kernel model (SDBKM), and this model is verified by non-interference theory. By monitoring and simplifying the trust dependence between domains, this model can solve problems in trust measurement such as deny of service (DoS) attack, Host security, and reduce the overhead of measurement.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Trusted Computing Group. TPM Main Specification Versions 1. 2 [EB/OL]. [2006-03-07].htt://www.trustedcomputinggroup.org.

  2. Reid J F, Caelli W. J DRM, Trusted Computing and Operating System Architecture[C]//Proceeding of Australasian Information Security Workshop (AISW) 2005. Newcastle, Australia, Feb 2005.

  3. Kelem N L, Reiertag R J. A, Separation Model for Virtual Machine Monitors[C]//Proceeding of the Sysposium on Research in Security and Privacy. Oakland, USA, May 1991.

  4. Rushby J. Proof of Separability: A Verification Technique for a Class of Security Kernels[C]//Proceeding of the 5th International Symposium on Programming. Turin, Italy, April 1982.

  5. Rushby J.Safe and Secure Computing Systems [M]. Malden: Blackwell Science Inc., 1989.

    Google Scholar 

  6. Garfinkel T, Pfaff B, Chow J. Terra: A Virtual Machine-Based Platform for Trusted Computing[C]//Proceedings of the 19th ACM Symposium on Operating Systems Principles. Bolton Landing, USA, Oct 2003.

  7. Microsoft. Security Model for the Next-Generation Secure Computing Base [EB/OL]. [2006-03-07].http://www.microsft.com

  8. Sailer R, Zhang Xiaolan, Jaeger T,et al. Design and Implementation of a TCG-Based Integrity Measurement Architecture[C]//Proceeding of the 13th USENIX Security Symposium. San Diego, USA, Aug 2004.

  9. Rushby JNoninterference, Transitivity, and Channel-Control Security Policies [R]. Menlo Park: Stanford Research Institute, 1992.

    Google Scholar 

  10. Grace H N,Proposed Technical Evaluation Criteria for Trusted Computer Systems [M]. Bedford: The Mitre Corporation, 1979.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Fang Yanxiang.

Additional information

Foundation item: Supported by the National Basic Research Program of China (G1999035801)

Biography: FANG Yanxiang (1975) male, Ph. D. candidate, research direction: system security.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Yanxiang, F., Changxiang, S., Jingdong, X. et al. A separated domain-based kernel model for trusted computing. Wuhan Univ. J. Nat. Sci. 11, 1424–1428 (2006). https://doi.org/10.1007/BF02831789

Download citation

  • Received:

  • Issue Date:

  • DOI: https://doi.org/10.1007/BF02831789

Key words

CLC number

Navigation