Volume 35 Issue 1
Jan.  2009
Turn off MathJax
Article Contents
Xu Yixi, Zhang Qishan, Liu Jianweiet al. Design of trusted Java card code loading mechanism[J]. Journal of Beijing University of Aeronautics and Astronautics, 2009, 35(1): 32-35. (in Chinese)
Citation: Xu Yixi, Zhang Qishan, Liu Jianweiet al. Design of trusted Java card code loading mechanism[J]. Journal of Beijing University of Aeronautics and Astronautics, 2009, 35(1): 32-35. (in Chinese)

Design of trusted Java card code loading mechanism

  • Received Date: 23 Jan 2008
  • Publish Date: 31 Jan 2009
  • Based on the requirements of the trusted computing platform (TCP) program code management, a trusted code management framework was proposed. The Java card technique was the core of the framework. The code signature technique was adopted for the program loading authentication while the on-card security domains were created as the off-card software authorities- security policies executors. The novel mechanism supported the installation and hot update of the device issuer software, promoted the installation and update procedure of the application provider software, and expanded the code-loading command data structure. The framework implemented the un-manual code broadcast distribution with the limitation of mutual independency of all software authorities under the hostile environment. This advanced Java card software loading mode improves the system-s security, and enables the trusted computing on the Java card platform.

     

  • loading
  • [1] Kent S. Protecting externally supplied software in small computers . Massachusetts, USA: Massachusetts Institute of Technology, 1980 [2] Whit S R, Comerford L D. ABYSS: a trusted architecture for software protection // Proceedings of the IEEE Symposium on Security and Privacy. New York, USA: IEEE Computer Society Press, 1987, 38-51 [3] White S, Weingart S H, Arnold W, et al. Introduction to the citadel architecture: security in physically exposed environment . RC16672, 1991 [4] Yee B S. Using secure coprocessors . Pittsburgh, USA: Department of Computer Science, Carnegie Mellon University, 1994 [5] Sean W S.可信计算平台:设计与应用[M].冯登国,徐震,张立武译.北京: 清华大学出版社, 2006:54-55 Sean W S. Trusted computing platforms: design and applications [M]. Translated by Feng Dengguo, Xu Zhen and Zhang Liwu. Beijing: Tsinghua University Press, 2006:54-55(in Chinese) [6] Sun Microsystems, Inc. Java card platform specification2.2.2 . NewYork, U.S: Sun Microsystems, Inc, 2005. http://www.Javasoft.com [7] Global Platform, Inc. Global platform card specification 2.1 . Readwood, U.S: GlobalPlatform, Inc , 2001. http://www.globalplatform.org
  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Article Metrics

    Article views(2998) PDF downloads(1360) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return