期刊文献+

新的可信网络框架研究 被引量:10

Study of new trusted network framework
下载PDF
导出
摘要 由于传统可信网络接入技术存在接入网络后缺乏保护、对安全芯片的利用率低和信任链传递不够完善的不足,因此在综合可信网络关键技术的基础上,基于可信平台模块(TPM)提出一种新的可信网络框架。该框架在提高TPM安全芯片利用率的同时,增强了可信网络的安全性,使可信网络用户得到更高级别的安全保护,可信度量以及数据加密传输等技术的应用确保该框架具有更高的安全性、可靠性、可信性和匿名性。 There are some deficiencies existing in the access technology of traditional trusted network, such as being lack of protection after network access, low efficiency of the security chip and imperfection of the trust transmission chain. In allusion to the above deficiencies, integrating the key techniques of trusted network, a new framework of trusted network based on Trusted Platform Module (TPM) was proposed, which could improve the efficiency of the security chip, enhance the credibility and security of trusted network and provid a higher security protection for the trusted network users. The application of trusted measurement, data encryption and transmission can ensure higher security, reliability, creditability and anonymity in the framework.
出处 《计算机应用》 CSCD 北大核心 2009年第9期2355-2359,2365,共6页 journal of Computer Applications
基金 国家863计划项目(2007AA01Z438200)
关键词 可信平台模块 可信网络 可信引导 可信度量 框架 Trusted Platform Module (TPM) trusted network trusted bootstarp trusted measurement framework
  • 相关文献

参考文献8

  • 1CLAESSENS J, DIAZ C, GOEMANS C, et al. Revocable anonymous access to the Intemet [ J]. Intemet Research, 2003, 13(4): 242 - 258.
  • 2Trusted Computing Group. TCG trusted network connect TNC architecture for interoperability [ EB/OL]. [ 2008 - 12 -05]. http:// www. trustedcomputinggroup, org,/tnc/.
  • 3TCG. TCG specification architecture overview, Version 1.2[ EB/ OL]. [2008 - 12 - 15]. http://www, trustedcomputinggroup, org.
  • 4Trusted Computing Group. TCG trusted network connect TNC architecture for interoperability, Specification vl. 3 Rev6 [ EB/OL]. [ 2008 - 12 - 10]. http://www, trustedcomputinggroup, org/tnc/.
  • 5高铁杠,顾巧论,陈增强.可信网络的可信模型与算法设计研究[J].计算机应用研究,2007,24(6):142-144. 被引量:7
  • 6王功明,关永,赵春江,吴华瑞.可信网络框架及研究[J].计算机工程与设计,2007,28(5):1016-1019. 被引量:10
  • 7陈志浩,谢小权.一个基于TPM芯片的可信网络接入模型[J].信息网络安全,2008(11):42-44. 被引量:4
  • 8Trusted Computing Group. Trusted platform module main specification part 1: Design Principles; Part 2: TPM Structures; Part 3: Commands [ EB/OL]. [ 2008 - 12 - 20]. http://www, trustedcomputinggroup, org.

二级参考文献34

  • 1贺炎,刘曙霞.Linux的进程调度策略[J].电子科技,2004,17(5):31-34. 被引量:5
  • 2赵心宇,朱齐丹,朱达书.应用WinPcap捕获网络数据包[J].应用科技,2004,31(11):29-31. 被引量:18
  • 3李远征.操作系统访问控制模型关键技术研究[J].计算机工程与设计,2005,26(4):1004-1005. 被引量:3
  • 4林闯,彭雪海.可信网络研究[J].计算机学报,2005,28(5):751-758. 被引量:252
  • 5李帆,郑纬民.基于角色与组织的访问控制模型[J].计算机工程与设计,2005,26(8):2136-2140. 被引量:27
  • 6AndrewSTanenbaum.计算机网络[M](第3版)[M].北京:清华大学出版社,2001..
  • 7教育部考试中心.全国计算机等级考试三级教程-网络技术[M].北京:高等教育出版社,2005.153-154.
  • 8LEWICKI R, MCALLISTER D,BIES R. Trust and distrust:new relationships and realities [ J ]. Academy of Management Review, 1998,23(12) :438-458.
  • 9KAMVAR S D, SCHLOSSER M T,GARCIA M H. The eigentrust algorithm for reputation management in P2P networks:proc. of the 12th International Conference on World Wide Web[C]. [ S. l. ] : [ s. n. ] , 2003:640- 651.
  • 10DING L, KOLARI P, GANJUGUNTE S,et al. Modeling and evaluating trust network inference :proc. of the 7th International Workshop on Trust in Agent Societies at AAMAS [ C ]. [ S. l. ] : [ s. n. ], 2004 : 21-32.

共引文献14

同被引文献114

引证文献10

二级引证文献29

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部