期刊文献+

可信计算及其安全性应用研究综述 被引量:5

The Research Survey of Trusted Computing and Its Application of Security
下载PDF
导出
摘要 对可信计算的研究动态进行了调研,对该领域的相关技术进行了归类及介绍.在认真分析现有技术的基础上,总结了当前可信计算的不足,并指出了可信计算继续发展应遵守的原则以及可信计算的未来发展趋势,系统分析了可信计算中的基本规范、密钥组成、信任证以及验证方式. A detailed review of the research on Trusted Computing (TC) is presented based on the survey and classification of the current techniques. According to the precise investigation on TC, the pitfalls of TC are pointed out and the reasonable rules that TC should observe are put forward, meanwhile, the development trend for TC is proposed. The basic specification, secret key, credential and mechanisms of attestation is analyzed ; security enhancement from the Bootstrap to the system loader is evaluated; the most current development of research in the rebuild of secure operating system is illustrated.
出处 《江西师范大学学报(自然科学版)》 CAS 北大核心 2009年第3期348-352,共5页 Journal of Jiangxi Normal University(Natural Science Edition)
基金 国家自然科学基金(60573059) 国家863计划(2007AA01Z160 2007AA04Z218)资助项目
关键词 信息安全 可信计算 平台安全 匿名验证 information security trusted computing platform security anonymous authentication
  • 相关文献

参考文献1

  • 1Zhang Huanguo,Luo Jie,Jin Gang,Zhu Zhiqiang,Yu Fajiang,Yan Fei. Development of trusted computing research[J] 2006,Wuhan University Journal of Natural Sciences(6):1407~1413

同被引文献28

  • 1郑志明,马世龙,李未,韦卫,姜鑫,张占利,郭炳晖.软件可信性动力学特征及其演化复杂性[J].中国科学(F辑:信息科学),2009,39(9):946-950. 被引量:12
  • 2邹道生.EDA技术在步进电机驱动中的应用[J].江西师范大学学报(自然科学版),2006,30(4):350-354. 被引量:8
  • 3Datta A,Franklin J,Garg D,et al.A logic of secure systems and its application to trusted computing[J].Security and Privacy,IEEE Symposium,2009,30:221-236.
  • 4Munoz A,Mana A,Serrano D.The role of trusted computing in secure agent migration[C]// Research Challenges in Information Science,Third International Conference.Fez,2009:255-264.
  • 5Glas B,Klimm A,Muller-Glaser K D,et al.Configuration measurement for FPGA-based trusted platforms[C]// Proceedings of the 2009 IEEE/IFIP International Symposium on Rapid System Prototyping.Washington DC:IEEE Computer Society,2009:123-129.
  • 6宋国强 丁文霞 刘立勇 鲁晓斌.浅谈数字图像加密技术.科技信息(学术研究),2007,(23).
  • 7汪晓光,孙晓瑛,王艳月.可编程序控制器原理及应用-M].北京:机械工业出版社,2000.
  • 8寥常初.可编程序控制器的编程方法与工业应用[M].重庆:重庆大学出版社,2001.
  • 9A.Mingozzi,L.Bianco and S.RicciardelliDy- namic Programming Strategies for the Traveling Sales- man Problem with Time Window and Precedence Con- straints[J].Operations Research,1997,45(3):365-377.
  • 10王飞,刘毅.可信计算平台安全体系及应用研究[J].微计算机信息,2007(03X):76-78. 被引量:18

引证文献5

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部