A log-based key authorization management scheme for trusted computing platform

@article{Cheng2012ALK,
  title={A log-based key authorization management scheme for trusted computing platform},
  author={Song Cheng and Peng Weiping and Tian Xinji},
  journal={2012 IEEE International Conference on Computer Science and Automation Engineering (CSAE)},
  year={2012},
  volume={3},
  pages={513-516}
}
One of the important technologies in trusted computing is secure storage. The key management is one of the important technologies in secure storage. However, there is a key synchronization problem in the existing key authorization management mechanism for Trusted Computing Platform. To solve the problem, we propose a log-based key authorization management scheme for trusted computing plaform. The new scheme can effectively enhance the trust and security of the trusted storage through… CONTINUE READING