Skip to main content
Log in

Protecting terminals by security domain mechanism based on trusted computing

  • Trusted Architecture
  • Published:
Wuhan University Journal of Natural Sciences

Abstract

Networks are composed with servers and rather larger amounts of terminals and most menace of attack and virus come from terminals. Eliminating malicious code and access or breaking the conditions only under witch attack or virus can be invoked in those terminals would be the most effective way to protect information systems. The concept of trusted computing was first introduced into terminal virus immunity. Then a model of security domain mechanism based on trusted computing to protect computers from proposed from abstracting the general information systems. The principle of attack resistant and venture limitation of the model was demonstrated by means of mathematical analysis, and the realization of the model was proposed.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Cohen F. Computer Viruses: Theory and Experiments [J].Computer & Security, 1987,6(1): 22–35.

    Article  Google Scholar 

  2. Adleman L M. An Abstract Theory of Computer Viruses [J].Lecture Notes in Computer Science, 1990,403: 109–115.

    MathSciNet  Google Scholar 

  3. Chen Zemao.Research on Security Architecture of Secure Operating System for Malicious Code Defending [D]. Wuhan: Naval University of Engineering, 2005 (Ch).

    Google Scholar 

  4. Shen Changxiang.Building Activity and Counterattack Framework of Security Assurance [R]. Beijing: The Second Peak Forum of Network Security Application, 2003 (Ch).

    Google Scholar 

  5. Cui Sheng. Where Will Information Security be Oriented and Terminal Security Brings Up Trusted Computing [EB/OL]. [2006-01-06].http://linux.ccidnet.com/art/35/20060105/407977_1.html. (Ch).

  6. Chen Zemao, Shen Changxiang. Operating System Security Based Policies for Computer Virus Prevention [J].Journal of Wuhan University of Technology, 2004,26(9): 75–77 (Ch).

    Google Scholar 

  7. International Telecommunication Union.Telecom and Information Technology Security [S]. Geneva: International Telecommunication Union, 2003.

    Google Scholar 

  8. General Administration of Quality Supervision, Inspection and Quarantine of the People's Republic of China.TC260-N0052 E-Banking Information System Security Assurance Criterion (Draft) [S]. Beijing: General Working Group for E-Government Standardization, 2004 (Ch).

    Google Scholar 

  9. Bell D E, LaPadula L J.Secure Computer Systems: Mathematical Foundations [R]. Bedford: Mitre Corp, 1973.

    Google Scholar 

  10. Biba K J.Integrity Considerations for Secure Computer Systems [R]. Bedford: USAF Electronic Systems Division, 1977.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Liu Yi.

Additional information

Foundation item: Supported by the National High-Technology Research and Development Program of China (2002AA:Z2101)

Biography: ZHOU Zheng (1978-), male, Ph. D. candidate, research direction: secure operation system.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Zheng, Z., Jun, Z., Jian, L. et al. Protecting terminals by security domain mechanism based on trusted computing. Wuhan Univ. J. Nat. Sci. 11, 1437–1440 (2006). https://doi.org/10.1007/BF02831792

Download citation

  • Received:

  • Issue Date:

  • DOI: https://doi.org/10.1007/BF02831792

Key words

CLC number

Navigation