Journal on Communications ›› 2013, Vol. 34 ›› Issue (5): 31-41.doi: 10.3969/j.issn.1000-436x.2013.05.004

• academic paper • Previous Articles     Next Articles

Analyzing the trust chain of trusted virtualization platform based on the extended LS2

De-xian CHANG1,2,3,Deng-guo FENG1,Yu QIN1,Qian-ying ZHANG1,2   

  1. 1 Institute of Software,Chinese Academy of Sciences,Beijing 100190,China;
    2 Graduate University of Chinese Academy of Sciences,Beijing 100049,China;
    3 3rd Institute,PLA Information Engineering University,Zhengzhou 450004,China
  • Online:2013-05-25 Published:2017-06-27
  • Supported by:
    The National Natural Science Foundation of China;The National Natural Science Foundation of China;The National Basic Research Program of China (973 Program)

Abstract:

Considering the effective formal analysis for the trust chain of the trusted virtualization platform,a trust chain model which includes the virtual machine and the virtual root of trust,was proposed firstly with the detail definition of the trusted properties.Through extending the LS2,it verified the correctness and uniqueness of the trust chain formally under some conditions.Analysis for the photosystem shows the generality of the proposed trust chain model and the va-lidity of the analysis method based on the extended LS2.

Key words: trusted computing, trusted virtualization platform, logic of secure system, trust chain, virtual root of trust

No Suggested Reading articles found!