期刊文献+

基于进化理论的可信计算环境实现

Implementation of Trusted Computing Environment Based on Evolutionary Theory
下载PDF
导出
摘要 文中对可信计算环境进行分析,提出了可信计算环境的公理系统。在综合研究了生物科学中的进化理论后给出了可信计算环境的进化方式:提出了基于用进废退的信任输入模型、基于人的选择的信任收敛模型、基于点断平衡论的信任模型;实现了基于进化理论的可信计算环境。仿真结果表明,可信计算环境的进化为可信计算的发展提供了理论依据,可以使可信计算环境适应变化的输入,并且收敛其信任值,对所有用户进行公正处理,进而高效率低代价就可以构建可信计算环境。 Analyze the trusted computing environment,and propose an axiom system of trusted computing environment. After the compre-hensive study of the theory of evolution in the biological sciences,give the evolution formula of trusted computing environment,including an input trust model based on use and disuse theory,a convergence trust model based on people’ s choice,and a trust model based on the theory of punctuated equilibrium. Implement the trusted computing environment based on evolutionary theory. The simulation shows that the evolution of trusted computing environment provides a theoretical basis for the development of trusted computing,enables it to adapt to changing and even unknown input,obtaining the convergence of the trust value of trusted computing environment and making it fair for all users. Also,the evolution of trusted computing environment implements trusted computing with a smaller cost.
出处 《计算机技术与发展》 2014年第7期99-102,106,共5页 Computer Technology and Development
基金 国家"863"高技术发展计划项目(2013AA014702)
关键词 可信计算 可信计算环境 进化理论 trusted computing trusted computing environment evolutionary theory
  • 相关文献

参考文献15

  • 1Guan Shangyuan, Dong Xiaoshe, Wu Weiguo, et al. Trust man- agement and service selection in pervasive computing environ- ments[ C ]//Proc of international conference on computational intelligence and security workshops. Harbin : IEEE, 2007 : 620 -623.
  • 2冯登国,秦宇.可信计算环境证明方法研究[J].计算机学报,2008,31(9):1640-1652. 被引量:33
  • 3TCG TPM SpecificationVersionl. 1 b [ EB/OL ]. [ 2005 - 06 - 20 ]. https://www, trustedcomputinggroup, org/developers/ trusted_platform_module/specification.
  • 4Brickell E,Camenisch J, Chen Liqun. Direct anonymous attes- tation[ C]//Proc of the llth ACM conference on computer and communications security. New York, NY, USA: ACM, 2004 : 132-145.
  • 5卿斯汉.可信计算的研究进展概述[J].信息网络安全,2008(11):18-19. 被引量:4
  • 6TCG. TCG TNC (Trusted Network Connect) architecture for interoperability verl. 2 [ EB/OL]. (2007-05-02) [ 2008-11 - 24]. http://www, trustedcomputinggroup, org/specs/TNC/ TNO_Architecture V1 2r4. pdf.
  • 7TCG. TCG specification architecture overview verl. 4 [ EB/ OL]. (2007-08-02) [ 2008-11 -24 ]. https ://www. trusted- computinggroup, org/groups/TCG 1 4 Architecture_Over- view. pdf.
  • 8Brizek J,Khan M,Seifert J P,et al. A platform-level trust-ar- chitecture for hand-held devices [ C ]//Proc of workshop on cryptographic advances in secure hardware. Belgium : [ s. n. ], 2005.
  • 9Eisenbarth T, Gflneysu T, Paar C, et al. Reconfigurable trusted computing in hardware [ C ]//Proceedings of the 2007 ACM workshop on scalable trusted computing. VA, USA : [ s. n. ] , 2007:15-20.
  • 10Dietrich K. An integrated architecture for trusted computing for java enabled embedded devices[ C ]//Proceedings of the 2007 ACM workshop on scalable trusted computing. VA, USA : [ s. n. 1.2007:2-6.

二级参考文献81

  • 1林闯,任丰原.可控可信可扩展的新一代互联网[J].软件学报,2004,15(12):1815-1821. 被引量:79
  • 2林闯,彭雪海.可信网络研究[J].计算机学报,2005,28(5):751-758. 被引量:253
  • 3林闯,汪洋,李泉林.网络安全的随机模型方法与评价技术[J].计算机学报,2005,28(12):1943-1956. 被引量:92
  • 4.马克思恩格斯选集(第1卷)[M].,..
  • 5.马克思恩格斯选集(第3卷)[M].北京:人民出版社,1995..
  • 6.马克思恩格斯选集(第2卷)[M].人民出版社,1995年版..
  • 7[德]尤尔根·哈贝马斯.重建历史唯物主义[M].北京:社会科学文献出版社,2000..
  • 8.马克思恩格斯选集(第4卷)[M].北京:人民出版社,1972..
  • 9.马克思恩格斯全集(第25卷)[M].,.第493页.
  • 10.马克思恩格斯全集(第19卷)[M].北京:人民出版社,1963..

共引文献122

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部