作者: W. Olin Sibert , Victor H. Shear , David M. Van Wie
DOI:
关键词:
摘要: Secure computation environments are protected from bogus or rogue load modules, executables and other data elements through use of digital signatures, seals certificates issued by a verifying authority. A authority—which may be trusted independent third party—tests the modules to verify that their corresponding specifications accurate complete, then digitally signs module executable based on tamper resistance work factor classification. with different factors verification signature authentication techniques (e.g., algorithms and/or keys)—allowing one environment protect itself against another, environment. Several dissimilar used reduce vulnerability algorithm compromise, subsets multiple signatures scope any specific compromise.