期刊文献+

可信计算研究 被引量:9

A Review of Trusted Computing
下载PDF
导出
摘要 网络中存在的各种隐患已经严重威胁到信息安全,网络攻击越来越趋于隐蔽化,攻击手法趋于复杂化,并且新的攻击手段不断更新,传统网络防护技术尽管也在不断发展,但已显得力不从心。可信计算的思想是从内部入手,从根源上防止各种安全隐患问题的发生。为对可信计算研究现状有一个直观的认识,提出了对"可信计算"体系结构的看法,详细介绍了可信计算终端的概念、特点和原理机制,对可信终端关键部件的结构和特点进行了描述。综述了可信计算在国内外的研究进展情况及目前可信计算的研究内容,并结合已有研究成果,对可信计算未来的研究方向进行了展望。 A variety of hidden dangers that exist in the network has been a serious threat to information security,network attacks are increasingly covert,attack methods become more complicated,and the new means of attack constantly updated,traditional network protection technology,although also growing,but it has become inadequate.Trusted computing idea is to start from within,from the root causes of the problem to prevent the occurrence of a variety of security risks.To have a direct-viewing understanding to trusted computing research,present the"trusted computing" architecture views,introduced in detail the trusted computing terminal's concept,characteristics and principles of mechanisms,have carried on the description to the trusted computing terminal key component's structure and characteristics.Summarized the trusted computing in the domestic and foreign research development situation and the present trusted computing research content,and to integrate existing research results,future research on trusted computing direction was predicted.
出处 《计算机技术与发展》 2010年第9期1-4,9,共5页 Computer Technology and Development
基金 国家自然科学基金(60903040) 国防科技大学预研项目(JC08-06-01)
关键词 可信计算 可信模块 可信软件协议栈 可信终端 信任链 trusted computing trusted platform module TCG software stack trusted terminal trusted chain
  • 相关文献

参考文献14

  • 1IEEE Computer Society.50 years of computing[J].Computer Innovation Technology Professional,1996,29(10):24-28.
  • 2Denning P J,Melcalfe R M.Beyond calculation:the nest fifty years of computing[M].New York:Springer -Verlay New York inc,1997:26-27.
  • 3周明天,谭良.可信计算及其进展[J].电子科技大学学报,2006,35(S1):686-697. 被引量:27
  • 4Pearson S.Trusted Computing Platform,the Next Security solution[R].Bristol,UK:HP Laboratories,2002.
  • 5邵时,袁亚.基于可信计算技术嵌入式安全终端的研究与实现[D].上海:华东师范大学信息学院,2007.
  • 6谭兴烈.可信计算平台中的关键部件TPM[J].信息安全与通信保密,2005,27(2):29-31. 被引量:15
  • 7Marshall D A,Michael V J.Trusted computing update[J].Computer & Security,1995(14):57-58.
  • 8佘堃,童永清.基于智能卡和PKI的可信计算平台的研究与实现[D].成都:电子科技大学,2008.
  • 9王震宇,刘鑫杰,任杰,刘海雷,吴杰.嵌入式终端可信计算环境的关键技术[J].计算机工程,2008,34(22):239-241. 被引量:5
  • 10DoD 5200.28-STD.Department of defense trusted computer system evaluation criteria[S].1985.

二级参考文献38

共引文献302

同被引文献73

引证文献9

二级引证文献39

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部