{"title":"Design and Application of Trusted Character in Security Kernel of PERSEUS Architecture","authors":"Xu Ning, Yang Mengmeng, Z. Tao, Wang Yadi","doi":"10.1109/ICINIS.2008.51","DOIUrl":null,"url":null,"abstract":"This paper aims to unite trusted computing techniques with PERSEUS security kernel, it introduces the definition of trusted character, and puts forward security kernel layer based on trusted character. This method can solve the problem of data protection, integrality control and resource snippet protection by setting trusted character entry points at sensitive position in the kernel. Lastly, it describes how to solve upgrading problem by sealing technology based on trusted character.","PeriodicalId":185739,"journal":{"name":"2008 First International Conference on Intelligent Networks and Intelligent Systems","volume":"41 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2008-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2008 First International Conference on Intelligent Networks and Intelligent Systems","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICINIS.2008.51","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
This paper aims to unite trusted computing techniques with PERSEUS security kernel, it introduces the definition of trusted character, and puts forward security kernel layer based on trusted character. This method can solve the problem of data protection, integrality control and resource snippet protection by setting trusted character entry points at sensitive position in the kernel. Lastly, it describes how to solve upgrading problem by sealing technology based on trusted character.