实现移动平台动态行为认证

Shahbaz Khan, Sanaullah Khan, M. Nauman, T. Ali, Masoom Alam
{"title":"实现移动平台动态行为认证","authors":"Shahbaz Khan, Sanaullah Khan, M. Nauman, T. Ali, Masoom Alam","doi":"10.1145/1838002.1838008","DOIUrl":null,"url":null,"abstract":"Modern mobile devices serve as platforms that consume services from multiple service providers. It is vital for such an open cell phone environment to secure the information flows of the stakeholders on the platform. Recent emergence of trusted computing technologies provides a root of trust in hardware, which can be used to construct a chain of trust. This chain of trust can be used to remotely verify that the platform is capable to manage information flows in a trusted manner. This work highlights how trusted computing technologies can be complemented with existing Mandatory Access Control mechanisms to verify the runtime and dynamic behaviors of a platform by using a high level, managerial policy - hence enabling a trustworthy platform with dynamic behavior management.","PeriodicalId":434420,"journal":{"name":"International Conference on Frontiers of Information Technology","volume":"11 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2009-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Realizing dynamic behavior attestation for mobile platforms\",\"authors\":\"Shahbaz Khan, Sanaullah Khan, M. Nauman, T. Ali, Masoom Alam\",\"doi\":\"10.1145/1838002.1838008\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Modern mobile devices serve as platforms that consume services from multiple service providers. It is vital for such an open cell phone environment to secure the information flows of the stakeholders on the platform. Recent emergence of trusted computing technologies provides a root of trust in hardware, which can be used to construct a chain of trust. This chain of trust can be used to remotely verify that the platform is capable to manage information flows in a trusted manner. This work highlights how trusted computing technologies can be complemented with existing Mandatory Access Control mechanisms to verify the runtime and dynamic behaviors of a platform by using a high level, managerial policy - hence enabling a trustworthy platform with dynamic behavior management.\",\"PeriodicalId\":434420,\"journal\":{\"name\":\"International Conference on Frontiers of Information Technology\",\"volume\":\"11 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2009-12-16\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"International Conference on Frontiers of Information Technology\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1145/1838002.1838008\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Conference on Frontiers of Information Technology","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/1838002.1838008","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1

摘要

现代移动设备作为使用来自多个服务提供商的服务的平台。对于这样一个开放的手机环境来说,确保平台上利益相关者的信息流是至关重要的。近年来出现的可信计算技术提供了硬件中的信任根,可以用来构建信任链。此信任链可用于远程验证平台是否能够以可信的方式管理信息流。这项工作强调了可信计算技术如何与现有的强制访问控制机制相辅相成,通过使用高级管理策略来验证平台的运行时和动态行为,从而实现具有动态行为管理的可信平台。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Realizing dynamic behavior attestation for mobile platforms
Modern mobile devices serve as platforms that consume services from multiple service providers. It is vital for such an open cell phone environment to secure the information flows of the stakeholders on the platform. Recent emergence of trusted computing technologies provides a root of trust in hardware, which can be used to construct a chain of trust. This chain of trust can be used to remotely verify that the platform is capable to manage information flows in a trusted manner. This work highlights how trusted computing technologies can be complemented with existing Mandatory Access Control mechanisms to verify the runtime and dynamic behaviors of a platform by using a high level, managerial policy - hence enabling a trustworthy platform with dynamic behavior management.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信