首页> 外文会议>Availability, Reliability, and Security, 2010. ARES '10 >Patterns for Secure Boot and Secure Storage in Computer Systems
【24h】

Patterns for Secure Boot and Secure Storage in Computer Systems

机译:计算机系统中安全启动和安全存储的模式

获取原文

摘要

Trusted Computing aims at enhancing the security of IT systems by using a combination of trusted hardware and software components to provide security guarantees. This includes system state integrity and the secure link between the software and hardware of a computing platform. Although security patterns exist for operating system security, access control, and authentication, there is still none of Trusted Computing aspects. In this paper, we introduce security patterns for secure boot and for secure storage, which are important basic Trusted Computing concepts. Secure boot is at the heart of most security solutions and secure storage is fundamental for application-level security: it ensures that the integrity of software is verified before accessing stored data. Our paper aims at complementing existing system security patterns by presenting the common patterns underlying the different realizations of secure boot and secure storage.
机译:可信计算旨在通过结合使用可信硬件和软件组件来提供安全保证,从而增强IT系统的安全性。这包括系统状态完整性以及计算平台的软件和硬件之间的安全链接。尽管存在用于操作系统安全性,访问控制和身份验证的安全模式,但是仍然没有可信计算方面的内容。在本文中,我们介绍了安全启动和安全存储的安全模式,它们是重要的基本可信计算概念。安全启动是大多数安全解决方案的核心,安全存储是应用程序级安全的基础:它可确保在访问存储的数据之前验证软件的完整性。我们的论文旨在通过介绍安全启动和安全存储的不同实现所基于的通用模式来补充现有的系统安全模式。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号