期刊文献+

基于TPM的移动终端接入可信网络体系结构 被引量:1

Architecture of TPM based mobile device accessing trusted network
下载PDF
导出
摘要 在介绍当前可信体系结构研究进展的基础上,提出一种基于TPM芯片的移动终端接入可信网络体系结构,给出其工作流程,并对此体系结构进行分析。分析结果表明,基于TPM的移动终端接入可信网络体系结构能够完成三元对等认证,将移动终端的可信扩展到了网络的可信,为可信移动网络的下一步研究提供了思路。 After introducing the development of current trusted computing architecture, architecture of TPM based mobile device accessing trusted network is proposed and its working process is given. Then the architecture is analyzed. The result shows that the architecture of TPM based mobile device accessing trusted network can finish the mutual authentications among three peer entities. The concept of trusted network on the basis of trusted mobile device is given and good solution is provided to further research about trusted mobile network.
作者 李洁 吴振强
出处 《计算机工程与设计》 CSCD 北大核心 2009年第6期1371-1375,共5页 Computer Engineering and Design
基金 国家自然基金重点项目(60633020)
关键词 可信计算 可信平台模块 可信网络连接 移动终端 体系结构 trusted computing trusted platform module trusted network connection mobile device architecture
  • 相关文献

参考文献10

  • 1林闯,彭雪海.可信网络研究[J].计算机学报,2005,28(5):751-758. 被引量:253
  • 2Trusted Computing Group.TCG specification architecture over-view[EB/OL].http://www.trustedcomputinggroup.org/,2004.
  • 3Microsoft.Trusted platform module services in windows long- horn [EB/OL] .http://www.microsoft.com/resources/ngscb/, 2005.
  • 4Intel Corporation.LaGrande technology architectural overview [EB/OL].http://www.intel.com/technology/security/,2005.
  • 5Trusted Computing Group. TPM main design principles [EB/ OL].2003.8.http://www.trustedcomputinggroup.org/.
  • 6Trusted Computing Group.Trusted network connect architecture for interoperability [EB/OL] .http://www.trustedcomputinggroup. org/,2007.
  • 7张涛.可信网络连接(TNC)架构的应用研究[J].电脑知识与技术,2005(11):24-26. 被引量:1
  • 8DoCoMo,IBM,Intel Corporation.Trusted mobile platform hard- ware architecture description[R].2004.
  • 9DoCoMo,IBM,Intel Corporation.Trusted mobile platform soft- ware architecture description[R].2004.
  • 10DoCoMo,IBM,Intel Corporation.Trusted mobile platform protocol specification document[R].2004.

二级参考文献18

  • 1林闯,任丰原.可控可信可扩展的新一代互联网[J].软件学报,2004,15(12):1815-1821. 被引量:79
  • 2李军.渐成热门的网络端点安全技术[J].计算机安全,2005(1):14-16. 被引量:8
  • 3.中国互联网发展状况统计[EB/OL].http://www.cnnic.net.cn,.
  • 4Algridas A., Laprie J.C., Brian R., Carl L.. Basic concepts and taxonomy of dependable and secure computing. IEEE Transactions on Dependable and Secure Computing, 2004, 1(1): 11~33
  • 5Nicol D.M., Sanders W.H., Trivedi K.S.. Model-based evaluation: From dependability to security. IEEE Transactions on Dependable and Secure Computing, 2004, 1(1): 48~65
  • 6Paulson L.D.. Stopping intruders outside the gates. IEEE Computer, 2002, 35(11): 20~22
  • 7International Standards Organization. Information Processing Systems-OSIRM. Part2: Security Architecture, ISO/TC 97 7498-2, 1998
  • 8Vaidya N.H.. A case for two-level recovery schemes. IEEE Transactions on Computers, 1998, 47(6): 656
  • 9Avizienis A.. Design of fault-tolerant computers. In: Proceedings of AFIPS Conference, 1967, 31: 733~743
  • 10Michael Atighetchi, Partha Pal et al.. Adaptive cyberdefense for survival and intrusion tolerance. IEEE Internet Computing, 2004, 8(6): 25~33

共引文献252

同被引文献1

引证文献1

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部