首页> 外文会议>International Conference on Frontiers in Anailability, Reliability, and Security >Patterns for Secure Boot and Secure Storage in Computer Systems
【24h】

Patterns for Secure Boot and Secure Storage in Computer Systems

机译:在计算机系统中安全启动和安全存储的模式

获取原文
获取外文期刊封面目录资料

摘要

Trusted Computing aims at enhancing the security of IT systems by using a combination of trusted hardware and software components to provide security guarantees. This includes system state integrity and the secure link between the software and hardware of a computing platform. Although security patterns exist for operating system security, access control, and authentication, there is still none of Trusted Computing aspects. In this paper, we introduce security patterns for secure boot and for secure storage, which are important basic Trusted Computing concepts. Secure boot is at the heart of most security solutions and secure storage is fundamental for application-level security: it ensures that the integrity of software is verified before accessing stored data. Our paper aims at complementing existing system security patterns by presenting the common patterns underlying the different realizations of secure boot and secure storage.
机译:可信计算旨在通过使用可信硬件和软件组件的组合来提高IT系统的安全性,以提供安全保证。这包括系统状态完整性和计算平台的软件和硬件之间的安全链接。虽然存在用于操作系统安全性,访问控制和身份验证的安全模式,但仍然没有可信计算方面。在本文中,我们介绍了安全的启动和安全存储的安全模式,这是重要的基本可信计算概念。安全启动位于大多数安全解决方案的核心,安全存储是应用程序级安全性的基础:它确保在访问存储的数据之前验证软件的完整性。我们的论文旨在通过呈现安全引导和安全存储的不同实现的常见模式来补充现有的系统安全模式。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号