期刊文献+

可信计算研究 被引量:27

Research on Trusted Computing
下载PDF
导出
摘要 综述了可信计算的现状,介绍了主流的可信计算技术,并着重分析了现有技术的积极因素和潜在问题。基于这些论述与分析,进一步研究了可信计算的本质内涵,推论出可信计算的实施策略,归纳了可信计算平台的功能要素。结合所进行的分析,提出了可信计算的发展建议。 This paper gives an overview of the actual state of trusted computing, introduces mainstreams of its technology, emphasizes on the analyzing of their positive effects and potential problems. Basing on these descriptions and analyzing, we survey the essential connotation of trusted computing farther, deduce the realization strategies of trusted computing, and conclude the factors of functions of trusted computing platform. Integrating with our surveys and analysis, we propose advices of evolution of trusted computing.
出处 《计算机应用研究》 CSCD 北大核心 2004年第12期1-4,22,共5页 Application Research of Computers
基金 国家自然科学基金资助项目 (90 1 0 40 2 5) 国家"863"计划资助项目 (2 0 0 3AA1 42 0 80 )
关键词 可信计算 TCPA NGSCB 安全 Trusted Computing TCPA NGSCB Security
  • 相关文献

参考文献16

  • 1TCG. Trusted Computing Group (TCG) Main Specification version 1.1a [EB/OL]. https://www.trustedcomputinggroup.org/downloads/tcg_spec_1_1b.zip,2001-09.
  • 2TCG. TCG PC Specific, Implementation Specification version 1.1 [EB/OL]. https://www.trustedcomputinggroup.org/downloads/TCG_PCSpecificSpecification_v1_1.pdf, 2003.
  • 3Amy Carroll, et al. Microsoft ''NGSCB'': A Business Overview[EB/OL]. http://www.microsoft.com/presspass/features/2002/jul02/0724NGSCBwp.asp, 2003.
  • 4Microsoft. Security Model for the Next-Generation Secure Computing Base [EB/OL]. http://www.microsoft.com/resources/ngscb/documents/ngscb_security_model.doc, 2003.
  • 5Microsoft. NGSCB: Trusted Computing Base and Software Authentication [EB/OL]. http://www.microsoft.com/resources/ngscb/documents/ngscb_tcb.doc, 2003.
  • 6Birgit Pfitzmann, et al. PERSEUS [EB/OL]. http://www.perseu-sos.org/, 2003.
  • 7Microsoft. Microsoft Next-Generation Secure Computing Base-Technical FAQ [EB/OL]. http://www.microsoft.com/technet/security/news/ngscb.asp,2003.
  • 8Havicaz. An Overview of the New Palladium Initiative and How it Affects You [EB/OL]. http://www.epimetrics.com/topics/one-to-pic?page_to-pic_id=59, 2002.
  • 9William A Arbaugh. Security: Technical, Social, and Legal Challenges [J]. IEEE Computer, 2002, 35(2): 109-111.
  • 10William A Arbaugh. The TCPA; What's wrong; What's right and What to do about [EB/OL]. www.cs.umd.edu/-waa/TCPA/TCPA-goodnbad.pdf, 2002.

同被引文献186

引证文献27

二级引证文献119

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部