• ISSN 0258-2724
  • CN 51-1277/U
  • EI Compendex
  • Scopus
  • Indexed by Core Journals of China, Chinese S&T Journal Citation Reports
  • Chinese S&T Journal Citation Reports
  • Chinese Science Citation Database
Volume 19 Issue 1
Feb.  2006
Turn off MathJax
Article Contents
ZHENG Yu, HE Da-ke, MEI Qi-xiang. Trusted Computing-Based Security Model for Software Protection[J]. Journal of Southwest Jiaotong University, 2006, 19(1): 63-67,96.
Citation: ZHENG Yu, HE Da-ke, MEI Qi-xiang. Trusted Computing-Based Security Model for Software Protection[J]. Journal of Southwest Jiaotong University, 2006, 19(1): 63-67,96.

Trusted Computing-Based Security Model for Software Protection

  • Received Date: 29 Apr 2005
  • Publish Date: 25 Feb 2006
  • With the help of the key technologies in trusted computing(TC) including integrity measurement,access control and seal storage,a TC-based secure model for software protection was proposed.A trusted platform module(TPM),which is an extention of current USB port,is employed in this model to prevent software from illegal copying,unauthorized modification and implementation of software.The technologies,such as dynamic password-based authentication,role-based access control,code transformation and channel encryption.Compared with traditional schemes,the proposed model implements mutual identification between user and software via TPM,and authentication mechanism via role-based access control(RBAC).

     

  • loading
  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索
    Article views(1080) PDF downloads(415) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return