信息网络安全
信息網絡安全
신식망락안전
Netinfo Security
2015年
9期
70-73
,共4页
可信计算%虚拟化%保障机制
可信計算%虛擬化%保障機製
가신계산%허의화%보장궤제
trusted computing%virtualization%assurance mechanism
文章分析可信计算硬件设备虚拟化需求,研究可信计算硬件设备虚拟化支持模式及其保障机制,提出确保虚拟机平台构建可信计算机制所需的密钥独立和完整性状态独立两条原则,并在分析I/O设备主要虚拟化机制基础上,提出两条可信计算硬件设备虚拟化关键保障机制:在虚拟化软件层确保安全的域间通信;可信计算硬件设备需具有可扩展的设备内部存储空间.
文章分析可信計算硬件設備虛擬化需求,研究可信計算硬件設備虛擬化支持模式及其保障機製,提齣確保虛擬機平檯構建可信計算機製所需的密鑰獨立和完整性狀態獨立兩條原則,併在分析I/O設備主要虛擬化機製基礎上,提齣兩條可信計算硬件設備虛擬化關鍵保障機製:在虛擬化軟件層確保安全的域間通信;可信計算硬件設備需具有可擴展的設備內部存儲空間.
문장분석가신계산경건설비허의화수구,연구가신계산경건설비허의화지지모식급기보장궤제,제출학보허의궤평태구건가신계산궤제소수적밀약독립화완정성상태독립량조원칙,병재분석I/O설비주요허의화궤제기출상,제출량조가신계산경건설비허의화관건보장궤제:재허의화연건층학보안전적역간통신;가신계산경건설비수구유가확전적설비내부존저공간.
This paper analyzes the virtualization requirements of trusted computing hardware device, and studies the virtual support mode and assurance mechanism, and puts forward two principles of key independent principle and complete state independent principle that are needed when constructs trusted computing mechanism on virtual platform. On the basis of analyzing virtualization mechanisms of the main I/O equipments, this paper also puts forward two key virtualization assurance mechanisms of trusted computing hardware device: to ensure the secure inter-domain communication in the virtualization software layer; to ensure the trusted computing hardware device has an expandable internal storage space.