期刊文献+

可信计算发展研究 被引量:11

Study on development of trusted computing
下载PDF
导出
摘要 可信计算是目前信息安全技术研究的一个热点,它是在计算系统的基础上发展来的。从科学计算、容错计算到可信计算,介绍了可信计算的起源和发展,重点分析了可信计算属性、可信计算机系统和可信平台的体系结构等关键技术,并对目前可信计算的研究现状和可信软件系统存在的难点问题进行了总结。 Trusted computing is a hotspot of information security research nowadays. It is developed based on computed system. From science computing and fault-tolerant computing to trusted computing, the origin and development of trusted computing were introduced, especially its property, trusted computer system, and architecture and key components of the trusted platform module. The current research and difficult problems of trusted software system have also been summarized.
出处 《计算机应用》 CSCD 北大核心 2009年第4期920-923,共4页 journal of Computer Applications
基金 国家自然科学基金资助项目(90718009) 贵州省高新技术发展及产业化项目(20085014) 重庆文理学院校内科研重点项目(Z2008SJ15Y2007SJ43)
关键词 可信计算 可信平台模块 信息安全 可信软件系统 trusted computing Trusted Platform Module (TPM) information security trusted software system
  • 相关文献

参考文献18

  • 1张焕国,罗捷,金刚,朱智强,余发江,严飞.可信计算研究进展[J].武汉大学学报(理学版),2006,52(5):513-518. 被引量:114
  • 2闵应骅.前进中的可信计算[J].中国传媒科技,2005(9):50-52. 被引量:4
  • 3Trusted Computing Group. TCG specification architecture overview [ EB/OL]. (2005 - 03 - 01 ) [ 2008 - 09 - 10]. https://WWW. trustedcomputinggroup, org/groups/TCG 1 0 Architecture Overview. pdf.
  • 4张旻晋 桂文明 苏递生 等.从终端到网络的可信计算技术.信息技术快报,2006,4(2):21-34.
  • 5PEARSON S. Trusted computing platform, the next security solution [ R]. Bristol UK: HP Laboratories, 2002.
  • 6沈昌祥,张焕国,冯登国,曹珍富,黄继武.信息安全综述[J].中国科学(E辑),2007,37(2):129-150. 被引量:359
  • 7AVIZIENIS A, LAPRIE J C, RANDELL B, et al. Basic concepts and taxonomy of dependable and secure computing[J]. IEEE Transactions on Dependable and Secure Computing, 2004, 1 (1): 11 -33.
  • 8Department of Defense Computer Security Center. Department of defense trusted computer system evaluation criteria[ S]. Washington, D C, USA: DOD, 1985.
  • 9National Computer Security Center. Trusted database management system interpretation, NCSC-TG-021 [ S]. Washington, D C, USA: DOD, 1991.
  • 10National Computer Security Center. Trusted network interpretation of the trusted computer system evaluation criteria, NCSC-TG-005 [S]. Washington, D C, USA: DOD, 1987.

二级参考文献45

共引文献885

同被引文献80

引证文献11

二级引证文献14

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部