期刊文献+

基于平台可信链的可信边界扩展模型 被引量:3

Trusted Boundary Extension Model Based on Trusted Chain on Platform
下载PDF
导出
摘要 以可信终端、可信连接、可信网络为代表的可信计算技术立足于终端和网络的自身免疫,开辟了以信任促安全的新思路,成为众多安全公司解决安全问题的热选技术。该文以可信终端技术中的可信链模型为对象,系统研究了可信链的概念模型,给出建模过程、模型的原型实现并指出该模型较之传统安全模型的优点。 Trusted computing technologies typically used in trusted terminal, trusted connect, trusted network, focusing on the self immunity of terminal and network, put forwards the thinking which accomplishes security in the way of building trust. It becomes the first choice of many information security companies. This paper chooses the trusted-chain model of trusted terminal technology as the research object, studies the conception model of trusted-chain, gives the modeling process, the realization of the model's antetype, and points out the advantages of the model compared with the conditional information security model.
出处 《计算机工程》 CAS CSCD 北大核心 2008年第6期176-178,181,共4页 Computer Engineering
关键词 可信计算 平台可信链 可信边界扩展 概念模型 trusted computing trusted chain on platform trusted boundary extension conception model
  • 相关文献

参考文献5

  • 1叶定松.计算机可信改造与实践[C]//中国信息安全发展趋势与战略高层研讨会文集.北京:出版者不祥,2005:51-53.
  • 2Proudler G, Trusted Computing[R]. TCG Technical Committee,2004.
  • 3科学技术信息研究所,中国TCG标准进入倒计时[EB/OL],(2005-11-25),www.stdaily,com/gb/misc/2004-11/24/content327428.htm.
  • 4TCG Glossary[EB/OL]. (2004-06-30), http://www trustedcomputing group.org.
  • 5Trusted Computing Work Group. TPM Main Specification[Z]. (2005-05-20). http://www.trustedcomputinggroup.org.

共引文献1

同被引文献20

引证文献3

二级引证文献55

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部