Trusted attestation of measurement action information base
YAN Jian-hong1,2,PENG Xin-guang1
1. College of Computer Science and Technology, Taiyuan University of Technology, Taiyuan Shanxi 030024, China;
2. Department of Computer Science, Taiyuan Normal University, Taiyuan Shanxi 030012, China
[1]Trusted Computing Group. TCG Specification architecture overview specification revision 1.2 [EB/OL]. [2011-04-15]. http://www.trustedcomputinggroup.org/.[2]Trusted Computing Group. TCG specification architecture overview [S]. Oregon, USA: Trusted Computing Group, 2007: 5-40.[3]STUMPF F, TAFRESCHI O, RDER P, et al. A robust integrity reporting protocol for remote attestation [C]// WATC 2006: Proceedings of the Second Workshop on Advances in Trusted Computing. Tokyo: [s.n.], 2006: 25-36.[4]SADEGHI A R, STUBLE C. Property-based attestation for computing platforms: Caring about properties, not mechanisms [C]// NSPW 2004: Proceedings of the 2004 Workshop on New Security Paradigms. New York: ACM Press, 2004: 67-77.[5]CHEN LIQUN, LANDFERMANN R, LOHR H, et al. A protocol for property-based attestation [C]// Proceedings of the First ACM Workshop on Scalable Trusted Computing. New York: ACM Press, 2006: 7-16.[6]HALDAR V. Semantic remote attestation [D]. Irvine: University of California, 2006.[7]李晓勇,左晓栋,沈昌祥.基于系统行为的计算平台可信证明[J].电子学报,2007,35(7):1234-1239.[8]庄琭,蔡勉,李晨.基于软件行为的可信动态度量[J].武汉大学学报:理学版,2010,56(2):133-137.[9]徐梓耀,贺也平,邓灵莉.一种保护隐私的高效远程验证机制[J].软件学报2011,22(2):339-352.[10]屈延文.软件行为学[M].北京:电子工业出版社,2004.[11]MERKLE R C. A certified digital signature [C]// Proceedings of the 9th Annual International Cryptology Conference on Advances in Cryptology. Berlin: Springer-Verlag, 1989: 218-238.