期刊文献+

基于人机交互的可信计算环境研究

Research on trusted computing environment based on human-computer interaction
原文传递
导出
摘要 通过建立可信存储根,提供一种可信人机交互平台。其核心思想是通过建立可信存储根,构造基本信任链、基本可信层和基本可信状态。可信平台的使用者通过人机信任接口确定信任预期的关系,从而决定可信存储根中对应存储单元的可信根。实现方法不依赖硬件,对现有通用计算平台进行重构,从而构建了人机交互的可信计算环境,使人机交互平台可信。 A trusted human computer interaction platform is provided through the establishment of a trusted storage root. The core issue of the credible mobile terminal is to create the basic trust chain, the basic trust layer and the basic trust state by establishing the trusted storage root. The user of the trusted platform determines the relationship of trust expectation through the man-computer interface, so as to determine the trusted root of the corresponding storage unit in the trusted storage root. The implementation method is not only dependent on the hardware, it can reconstruct the existing general computing platform, so as to make the trusted computing environment of human-computer interaction.
机构地区 中国联通研究院
出处 《互联网天地》 2016年第12期13-15,共3页 China Internet
关键词 人机交互平台 可信计算 可信存储 human-computer interaction platform trusted computing trusted storage
  • 相关文献

参考文献2

二级参考文献30

  • 1[1]Trusted computing group.Trusted platform module main specification Version 1.2[S].2005.
  • 2[2]Sailer R,Zhang X,Jaeger T,et al.Design and implementation of a TCG-based integrity measurement architecture[C]//Proceedings of the 13th Usenix Security Symposium.California:Usenix,2004:223-238.
  • 3[3]biba K J.Integrity considerations for secure computer systems[R].ESD-TR-76-372,Bedford,MA:USAF Electronic Systems Division,Hanscom Air Force Base,1977.
  • 4[4]Oppliger R,Rytz R.Does trusted computing remedy computer security problem[J].Security & Privacy Magazine(IEEE),2005,3(2):16-19.
  • 5[5]Felten E W.Understanding trusted computing:Will its benefits outweigh its drawbacks[J].Security & Privacy Magazine(IEEE),2003,1(3):60-62.
  • 6[6]Iliev A,Smith S W.Protecting client privacy with trusted computing at the server[J].Security & Privacy Magazine(IEEE),2005,3(2):20-28.
  • 7Trusted Computing Group. TCG Architecture Overview. Specification, Revision 1.2. 28 April 2004
  • 8中国国家密码管理局.可信计算密码支撑平台功能与接口规范.2007年12月
  • 9Trusted Computing Group. TPM Main Part 1, Design Principles. Specification Version 1.2, Revision 62. 2 October 2003
  • 10Sailer Reiner, Zhang Xiao-Lan, Jaeger Trent, van Doorn Leendert. Design and implementation of a TCG-based integrity measurement arehiteeture//Proeeedings of the 13th Usenix Security Symposium. San Diego, California, 2004: 223- 238

共引文献40

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部