期刊文献+

可信平台模块命令安全性和性能分析

Security and performance analysis of the trusted platform module commands
下载PDF
导出
摘要 作为可信计算平台核心,可信计算模块(TPM)芯片是可信计算安全性的基础。分析TPM及其命令接口的特征和安全性,并对比相同功能的软件实现,分析其执行性能。 Trusted platform module (TPM) is the key part of trust computing platform and therefore determines the overall security of trusted computing. This paper studies the security of the module as well as its commends, compares and analyzes the execution time performance of the module with the software-based interfaces.
出处 《信息技术》 2009年第7期32-34,38,共4页 Information Technology
基金 国家自然科学基金(B1632A)
关键词 TPM 命令 安全l生 性能 TPM commands security performance
  • 相关文献

参考文献1

二级参考文献11

  • 1Seigneur J M,Jensen C D.Trading privacy for trust[C]//Proceedings of the International Conference on Trust Management.Berlin,Germany:Springer Verlag,2004:93-107.
  • 2Kinateder M,Pearson S.A privacy-enhanced peer-to-peer reputation system[C]//Procecdings of the 4th International Conference on Electronic Commerce and Web Technologies.Berlin,Germany:Springer Verlag,2003:206-215.
  • 3Ismail R,Boyd C.Jsang A,et al.Private reputation schemes for P2P systems[C]//Proceedings of the Second International Workshop on Security in Information Systems.Portugal:INSTICC Press,2004:196-206.
  • 4Ismail R,Boyd C,Jφsang A,et al.A security architecture for reputation systems[C]//Procecdings of the 4th International Conference of E-Commerce and Web Technologies.Berlin,Germany:Springer Verlag,2003:176-185.
  • 5Miranda H,Rodrigues L.A framework to provide anonymity in reputation systems[C]//Proceedings of the Third Annual International Conference on Mobile and Ubiquitous Systems:Networks and Services.California,USA:IEEE Computer Society Press,2006:1 -4.
  • 6Ismail R,Boyd C,Jφsang A,et al.Strong privacy in reputation systems[C]//Proceedings of the 4th International Workshop on Information Security Applications.Berlin,Germany:Springer Verlag,2003:25 -27.
  • 7Vaughan-Nichols S J.How trustworthy is trusted computing?[J].Computer,2003,36(3):18-20.
  • 8Brickell E,Camenisch J,Chen L.Direct anonymous attestation[C]//Proceedings of 11th ACM Conference on Computer and Communications Security.Washingtion DC,USA:ACM Press,2004:132-145.
  • 9Camenisch J.Better privacy for trusted computing platforms[C]//Proceedings of the 9th European Symposium on Research in Computer Security.Berlin,Germany:Springer Verlag,2004:73-88.
  • 10Hao L M,Sun X,Yang S T,et al.A method to implement full anonymous attestation for trusted computing platform[C]//Proceedings of the Second Conference on Trusted Computing and Information Security.Wuhan,China:Wuhan University Journals Press,2007:101-104.

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部