期刊文献+

瑞达可信计算平台 被引量:1

下载PDF
导出
作者 刘毅 余发江
出处 《信息网络安全》 2006年第11期23-25,共3页 Netinfo Security
  • 相关文献

同被引文献13

  • 1周明辉,梅宏.可信计算研究的初步探疑[J].计算机科学,2004,31(7):5-8. 被引量:14
  • 2李晓勇,左晓栋,沈昌祥.基于系统行为的计算平台可信证明[J].电子学报,2007,35(7):1234-1239. 被引量:35
  • 3Trusted Computing Group. TNC Architecture for Interoperability [ EB/OL ]. http://www, trustedcomputinggroup, org/resources/tnc architecture for_ interoperability_ version_ 13.
  • 4Intel. Intel Trusted Execution Technology [ EB/OL]. http:// www. intel, com/technology/security/downloads/TrustedExec _ Overview. pdf, 2007.
  • 5Microsoft Coporation.. Next-generation secure computing base [ EBOL ]. http://www, microsoft, com/res- ources/ngscb/default, mspx 2003.
  • 6Trusted Computing Group. TCG specification architecture overview [ EB/OL ]. http://www, tmstedcomputinggroup. org/resources/tcg architecture_ overview version_ 14, 2010 - 03.
  • 7Trusted Computing Group. Infrastructure work group integrity report schema specification[ EB/OL]. http://www, trustedcomputinggroup, org/resources/infrastructure _ work_ groupintegrity _ report_ schema_ specification version_ 10, 2010 - 03.
  • 8Goguan J A. Meseguem J. Security policies and security model [A]. The 1982 IEEE Symposium on Security and Privacy[ C]. Qakland, California, 1982.11 - 20.
  • 9RUSHBY J. Noninterference, Transitivity, and Channel-Control Security Policies [ R ]. CSL-92-02, Menlo Park: Stanford Research Institute, 1992.
  • 10Dunlap G W, King S T,Cinar S,et al. ReVirt: enabling intrusion analysis through virtual-machine logging and replay[J]. ACM SIGOPS Operating Systems Rev, 2002, 36(S1) : 211 - 224.

引证文献1

二级引证文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部