期刊文献+

浮点运算部件中可信性的研究 被引量:1

Creditability in ALU of floating-point
下载PDF
导出
摘要 介绍了信息系统可信性的概念,选用了IBM POWER6浮点乘加部件中的算术运算为实例,对提高浮点运算部件中计算可信性的关键技术进行探究,为研究计算机算术运算的可信性提供了一定的参考。 This paper introduces the credibility of information system, and takes the floating point arithmetic operations on IBM POWER6 for example, provided the key technology in floating point calculation to improve the credibility, which provides a certain reference for study the credibility of the computer arithmetic operations.
出处 《信息技术》 2012年第12期62-64,共3页 Information Technology
基金 咸阳师范学院专项科研基金项目(10XSYK308) 国家自然科学基金项目(6110208)
关键词 可信性 浮点数 浮点运算 credibility floating-point number floating-point arithmetic
  • 相关文献

参考文献8

  • 1Trusted Computing Platform Alliance. TCP A Design Philosophies and Concepts Version1.0[S/OL]. https://www.trustedeomPutinggrouP, org: Jan 2001.
  • 2[EB/OL]. http ://cio. ccw. com. cn/research/dictionary/htm2009/ 20090305598359. shtml.
  • 3Montoye R K, Hokenek E, Runyon S L. Design of the IBM RISC System/6000 floating-point execution unit [ J ]. IBM Journal of Research and Development, 1990,34( 1 ) :61 - 75.
  • 4蒋本珊.计算机组成原理[M].2版.北京:清华大学出版社,2009.5:30-32.
  • 5Curran B, MeCredie B,Siqal L,et al. 4GHz + Low-Latency Fixed-Point and Binary Floating-Point Execution Units for the POWER 6 Processor[ C ]. Digest of 2006 IEEE International Solid-State Circuits Conference, 2006 : 1728 - 1734.
  • 6Donnell JO, Rnger G. Derivation of a carry lookahead addition circuit [J]. Journal of Functional Programming,2004,14(6) :127 -158.
  • 7刘威鹏,胡俊,方艳湘,沈昌祥.基于可信计算的终端安全体系结构研究与进展[J].计算机科学,2007,34(10):257-263. 被引量:18
  • 8Kiat-Seng Yeo, Samir S Rofail, Wang-Liang Goh,等.低压低功耗CMOS/BiCMOS超大规模集成电路[M].周元兴,张志龙,等译.北京:电子工业出版社,2003:356-372.

二级参考文献37

  • 1沈昌祥.可信计算平台与安全操作系统[J].网络安全技术与应用,2005(4):8-9. 被引量:13
  • 2林宣雄,李怀祖,张文修.安全内核方法与实现考虑[J].计算机科学,1996,23(1):36-39. 被引量:1
  • 3Jaeger T, Sailer R, Zhang X. Analyzing integrity protection in the SELinux example policy. In:Proceedings of the 12^th USENIX Security Symposium, USENIX, August 2003. 59-74
  • 4Jaeger T, Sailer R, Zhang X. Resolving constraint conficts. In: SACMAT '04: Proceedings of the ninth ACM symposiumon Access control models and technologies, New York, NY, USA, ACM Press,2004. 105-114
  • 5Jaeger T, Sailer R. Umesh Shankar PRIMA: Policy-Reduced Integrity Measure Architecture
  • 6Yoshihama S, Ebringer T, Nakamura M, Munetoh S. Hiroshi Maruyama WS-Attestation: Efficient and Fine-Grained Remote Attestation on Web Services. In: Proceedings of the IEEE International Conference on Web Services (ICWS'05)
  • 7Safford D,Zohar M. A trusted Linux Client. IBM T. J. Watson Research Center, 2004
  • 8陈幼雷 等.操作系统可信增强框架研究与实现[J].计算机应用与研究,.
  • 9Reid J F, Caelli W J. DRM, Trusted Computing and Operating System Architecture. In: Australasian Information Security Workshop.(AISW2005),Newcastle,Australia
  • 10http://www. trustedcomputinggroup. org

共引文献17

同被引文献11

  • 1张焕国,赵波.可信计算[M].武汉:武汉大学出版社,2011:33-35.
  • 22012年我国互联网网络安全态势综述[EB/OL].http://www.cert.org.cn.
  • 3BenSmyth,MarkRyan,LiqunChenDireetAnon ymousAttestation(DAA):EnsuringPrivacywith eorruPtadministratorsLastuPdated[Cl:Julys, 2007.
  • 4JOSHI J, GHAFOOR A. Digit government security Infrastructure Design Challenge[J].IEEE Computer,2001, 34(2):66-72.
  • 5J.Camenisch, Better Privacy for Trusted Computing Platforms,In Proceedings of 9th European Symposium On Research in Computer Security (ESORICS 2004),2004.
  • 6G.Ateniese,J.Camenisch,M.Joye,andG.Tsudik. Apracticaland provably secure coalition.resistant group signature scheme InM.Bellare,editor, Advances in Cryptology.CRYPTO 2000,volume 1880 of LNCS, page:255 -270.Spriner Verla.2000.
  • 7BenSmyth, MarkRyan, LiqunChen. Direet Anonymous Attestation(DAA) :Ensuring Privacy with eorru Ptad ministrators Lastu Pdated Cl:Julys,2007.
  • 8Zhang Xinwen, Chen Songqing, Ravi Sandhu. Enhancing Data Authenticity and Integrity in P2P Systems[J].IEEE Internet Computing,2005,9(6):42-49.
  • 9Qaaz.Linux Kernel 2.6.17-2.6.24.1vmsplice local root exploit. [EB/OL]. [2010-11-23 ].http://www.milw0rm.com/ exploits/5092.
  • 10姚崎.基于可信计算的区域边界防护模型研究与应用[J].信息安全与技术,2010,1(6):71-75. 被引量:5

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部