期刊文献+

基于可信度量的信息系统故障快速诊断协议 被引量:2

Fast Diagnosis based on Trusted Measurement Protocols for Information System Fault
原文传递
导出
摘要 随着计算机和互联网的飞速发展,信息系统的安全状况日趋复杂、混乱,应对信息系统故障在所难免,在实施PKI的信息系统中,设立权威可信第三方——度量中心,继承传统公钥密码体制优势,基于可信度量机制,设计度量存储协议、信息传输协议、快速诊断协议,目的是加强信息系统安全,对信息系统故障进行快速诊断,提高系统运行效率。 With to the speedy development of computer and Internet, the information system security situation is becoming more complex and confused, so it is unavoidable to cope with this situation, In the PKI-implemented information system, setting up the trusted third party--the measurement center, inheriting the advantage of conventional public key cipher system, designing a measurement and storage protocol, information transport protocol and fast diagnosis protocol based on the trusted measurement, all these are for the purpose of enhancing the security of information system, rapidly diagnosing the information system faults and improving the running efficiency of information system.
出处 《通信技术》 2008年第12期366-368,371,共4页 Communications Technology
关键词 PKI(公钥基础设施) 可信度量 故障诊断 PKI(Public Key Infrastructure) trusted measurement fault diagnosis
  • 相关文献

参考文献4

  • 1侯方勇,周进,王志英,刘真,刘芸.可信计算研究[J].计算机应用研究,2004,21(12):1-4. 被引量:28
  • 2沈昌祥 张焕国 冯登国 曹珍富 黄继武.信息安全综述.中国科学E辑:信息科学,.
  • 3TCG. TCG Specification Architecture Overview Specification Revision 1.4:[EB/OL].[2007-8-2]. https://www. Tcomputinggroup, org/5-19.
  • 4TCG. TPM Main Part 1 Design Principles Specification Version 1.2 Level 2 Revision 103:[EB/OL]. [2007-7-9].https://www. Tcomputinggroup. org/:12-15, 26-28, 55-59.

二级参考文献16

  • 1Microsoft. NGSCB: Trusted Computing Base and Software Authentication [EB/OL]. http://www.microsoft.com/resources/ngscb/documents/ngscb_tcb.doc, 2003.
  • 2Birgit Pfitzmann, et al. PERSEUS [EB/OL]. http://www.perseu-sos.org/, 2003.
  • 3Microsoft. Microsoft Next-Generation Secure Computing Base-Technical FAQ [EB/OL]. http://www.microsoft.com/technet/security/news/ngscb.asp,2003.
  • 4Havicaz. An Overview of the New Palladium Initiative and How it Affects You [EB/OL]. http://www.epimetrics.com/topics/one-to-pic?page_to-pic_id=59, 2002.
  • 5William A Arbaugh. Security: Technical, Social, and Legal Challenges [J]. IEEE Computer, 2002, 35(2): 109-111.
  • 6William A Arbaugh. The TCPA; What's wrong; What's right and What to do about [EB/OL]. www.cs.umd.edu/-waa/TCPA/TCPA-goodnbad.pdf, 2002.
  • 7AgainstTCPA.com. Against-TCPA [EB/OL]. http://www.againsttcpa.com/, 2003.
  • 8STOPPALLADIUM.org. STOPPalladium [EB/OL]. http://www.stoppalladium.org/html/, 2003.
  • 9Lawrence Lessig. Anti-trusting Microsoft [EB/OL]. www.lessig.org/content/columns/red1.pdf, 2002.
  • 10Eugene Schultz. Pandora's Box: Spyware, Adware, Autoexecution, and NGSCB [J]. Computer & Security, 2003,22(5): 366-367.

共引文献27

同被引文献7

引证文献2

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部