期刊文献+
共找到417篇文章
< 1 2 21 >
每页显示 20 50 100
Enhancing Energy Efficiency with a Dynamic Trust Measurement Scheme in Power Distribution Network
1
作者 Yilei Wang Xin Sun +4 位作者 Guiping Zheng Ahmar Rashid Sami Ullah Hisham Alasmary Muhammad Waqas 《Computers, Materials & Continua》 SCIE EI 2024年第3期3909-3927,共19页
The application of Intelligent Internet of Things(IIoT)in constructing distribution station areas strongly supports platform transformation,upgrade,and intelligent integration.The sensing layer of IIoT comprises the e... The application of Intelligent Internet of Things(IIoT)in constructing distribution station areas strongly supports platform transformation,upgrade,and intelligent integration.The sensing layer of IIoT comprises the edge convergence layer and the end sensing layer,with the former using intelligent fusion terminals for real-time data collection and processing.However,the influx of multiple low-voltage in the smart grid raises higher demands for the performance,energy efficiency,and response speed of the substation fusion terminals.Simultaneously,it brings significant security risks to the entire distribution substation,posing a major challenge to the smart grid.In response to these challenges,a proposed dynamic and energy-efficient trust measurement scheme for smart grids aims to address these issues.The scheme begins by establishing a hierarchical trust measurement model,elucidating the trust relationships among smart IoT terminals.It then incorporates multidimensional measurement factors,encompassing static environmental factors,dynamic behaviors,and energy states.This comprehensive approach reduces the impact of subjective factors on trust measurements.Additionally,the scheme incorporates a detection process designed for identifying malicious low-voltage end sensing units,ensuring the prompt identification and elimination of any malicious terminals.This,in turn,enhances the security and reliability of the smart grid environment.The effectiveness of the proposed scheme in pinpointing malicious nodes has been demonstrated through simulation experiments.Notably,the scheme outperforms established trust metric models in terms of energy efficiency,showcasing its significant contribution to the field. 展开更多
关键词 IIoT trusted measure energy efficient
下载PDF
Behavior Measurement Model Based on Prediction and Control of Trusted Network 被引量:5
2
作者 Gong Bei Zhang Jianbiao +1 位作者 Shen Changxiang Zhang Xing 《China Communications》 SCIE CSCD 2012年第5期117-128,共12页
In order to construct the trusted network and realize the trust of network behavior,a new multi-dimensional behavior measurement model based on prediction and control is presented.By using behavior predictive equation... In order to construct the trusted network and realize the trust of network behavior,a new multi-dimensional behavior measurement model based on prediction and control is presented.By using behavior predictive equation,individual similarity function,group similarity function,direct trust assessment function,and generalized predictive control,this model can guarantee the trust of an end user and users in its network.Compared with traditional measurement model,the model considers different characteristics of various networks.The trusted measurement policies established according to different network environments have better adaptability.By constructing trusted group,the threats to trusted group will be reduced greatly.Utilizing trusted group to restrict individuals in network can ensure the fault tolerance of trustworthiness of trusted individuals and group.The simulation shows that this scheme can support behavior measurement more efficiently than traditional ones and the model resists viruses and Trojans more efficiently than older ones. 展开更多
关键词 trusted network behavioral predic-tive control SIMILARITY trust measurement
下载PDF
A Trusted Measurement Scheme Suitable for the Clients in the Trusted Network 被引量:3
3
作者 GONG Bei ZHANG Jianbiao +1 位作者 YE Xiaolie SHEN Changxiang 《China Communications》 SCIE CSCD 2014年第4期143-153,共11页
The trusted network connection is a hot spot in trusted computing field and the trust measurement and access control technology are used to deal with network security threats in trusted network.But the trusted network... The trusted network connection is a hot spot in trusted computing field and the trust measurement and access control technology are used to deal with network security threats in trusted network.But the trusted network connection lacks fine-grained states and real-time measurement support for the client and the authentication mechanism is difficult to apply in the trusted network connection,it is easy to cause the loss of identity privacy.In order to solve the abovedescribed problems,this paper presents a trust measurement scheme suitable for clients in the trusted network,the scheme integrates the following attributes such as authentication mechanism,state measurement,and real-time state measurement and so on,and based on the authentication mechanism and the initial state measurement,the scheme uses the realtime state measurement as the core method to complete the trust measurement for the client.This scheme presented in this paper supports both static and dynamic measurements.Overall,the characteristics of this scheme such as fine granularity,dynamic,real-time state measurement make it possible to make more fine-grained security policy and therefore it overcomes inadequacies existing in the current trusted network connection. 展开更多
关键词 trusted computing trusted network AUTHENTICATION state measurement real-time measurement
下载PDF
Dynamic Integrity Measurement Model Based on vTPM 被引量:2
4
作者 Ruizhong Du Wangyang Pan Junfeng Tian 《China Communications》 SCIE CSCD 2018年第2期88-99,共12页
With the development of cloud computing, virtualization technology has been widely used in our life. Meanwhile, it became one of the key targets for some attackers. The integrity measurement in virtual machine has bec... With the development of cloud computing, virtualization technology has been widely used in our life. Meanwhile, it became one of the key targets for some attackers. The integrity measurement in virtual machine has become an urgent problem. Some of the existing virtualization platform integrity measurement mechanism introduces the trusted computing technology, according to a trusted chain that the Trusted Platform Module(TPM) established for trusted root to measure the integrity of process in static. But this single chain static measurement cannot ensure the dynamic credible in platform running. To solve the problem that the virtual trusted platform can not guarantee the dynamic credibility, this paper put forward Dynamic Integrity Measurement Model(DIMM) based on virtual Trusted Platform Module(v TPM) which had been implemented with typical virtual machine monitor Xen as an example. DIMM combined with virtual machine introspection and event capture technology to ensure the security of the entire user domain. Based on the framework, this paper put forward Self-modify dynamic measurement strategy which can effectively reduce the measurement frequency and improve the measurement performance. Finally, it is proved that the validity and feasibility of the proposed model with comparison experiments. 展开更多
关键词 XEN trusted chain integrity mea-surement Self-modify measurement strategy dynamic integrity
下载PDF
Micro-Architecture Support for Integrity Measurement on Dynamic Instruction Trace 被引量:2
5
作者 Hui Lin Gyungho Lee 《Journal of Information Security》 2010年第1期1-10,共10页
Trusted computing allows attesting remote system’s trustworthiness based on the software stack whose integrity has been measured. However, attacker can corrupt system as well as measurement operation. As a result, ne... Trusted computing allows attesting remote system’s trustworthiness based on the software stack whose integrity has been measured. However, attacker can corrupt system as well as measurement operation. As a result, nearly all integrity measurement mechanism suffers from the fact that what is measured may not be same as what is executed. To solve this problem, a novel integrity measurement called dynamic instruction trace measurement (DiT) is proposed. For DiT, processor’s instruction cache is modified to stores back instructions to memory. Consequently, it is designed as a assistance to existing integrity measurement by including dynamic instructions trace. We have simulated DiT in a full-fledged system emulator with level-1 cache modified. It can successfully update records at the moment the attestation is required. Overhead in terms of circuit area, power consumption, and access time, is less than 3% for most criterions. And system only introduces less than 2% performance overhead in average. 展开更多
关键词 integrity measurement Remote Attestation Software VULNERABILITY trusted computing
下载PDF
BBACIMA:A Trustworthy Integrity Measurement Architecture through Behavior-Based TPM Access Control
6
作者 YU Aimin FENG Dengguo 《Wuhan University Journal of Natural Sciences》 CAS 2008年第5期513-518,共6页
Two limitations of current integrity measurement architectures are pointed out: (1) a reference value is required for every measured entity to verify the system states, as is impractical however; (2) malicious us... Two limitations of current integrity measurement architectures are pointed out: (1) a reference value is required for every measured entity to verify the system states, as is impractical however; (2) malicious user can forge proof of inexistent system states. This paper proposes a trustworthy integrity measurement architecture, BBACIMA, through enforcing behavior-based access control for trusted platform module (TPM). BBACIMA introduces a TPM reference monitor (TPMRM) to ensure the trustworthiness of integrity measurement. TPMRM enforces behavior-based access control for the TPM and is isolated from other entities which may be malicious. TPMRM is the only entity manipulating TPM directly and all PCR (platform configuration register) operation requests must pass through the security check of it so that only trusted processes can do measurement and produce the proof of system states. Through these mechanisms malicious user can not enforce attack which is feasible in current measurement architectures. 展开更多
关键词 integrity measurement behavior-based access control trusted platform module (TPM) trusted computing remoteattestation
下载PDF
Analysis and Application for Integrity Model on Trusted Platform
7
作者 TUGuo-qing ZHANGHuan-guo WANGLi-na YUDan-dan 《Wuhan University Journal of Natural Sciences》 CAS 2005年第1期35-38,共4页
To build a trusted platform based on Trusted Computing Platform Alliance(TCPA)' s recommendation, we analyze the integrity mechanism for such a PC platfoim in this paper.By combinning access control model with inf... To build a trusted platform based on Trusted Computing Platform Alliance(TCPA)' s recommendation, we analyze the integrity mechanism for such a PC platfoim in this paper.By combinning access control model with information flow model, we put forwarda combinedprocess-based lattice model to enforce security This moelel creates a trust chain by which we canmanage a series of processes from a core root of trust module to some other application modules Inthe model, once the trust chain is created andmanaged cor-rectly, the integrity of the computer'shardware and sofware has bctn maintained, so does the confidentiality and authenticity. Moreover, arelevant implementation of the model is explained. 展开更多
关键词 tiusted computing access control model information flow model trust chain integrity
下载PDF
A Sensing Layer Network Resource Allocation Model Based on Trusted Groups
8
作者 Bei Gong Xipeng Zhang +2 位作者 Shen He Nan Tian Yubo Wang 《China Communications》 SCIE CSCD 2019年第10期151-173,共23页
There are many heterogeneous sensing nodes in the sensing layer of the Internet of Things, and the amount of data transmission is huge, which puts high requirements on the allocation of network bandwidth. At the same ... There are many heterogeneous sensing nodes in the sensing layer of the Internet of Things, and the amount of data transmission is huge, which puts high requirements on the allocation of network bandwidth. At the same time, untrusted sensing nodes maliciously invade network resources. Therefore, how to confirm whether a sensing node is trusted and reasonably allocate network resources is an urgent problem to be solved. To resolve this issue, this paper proposes a sensing network resource allocation model based on trusted groups. Through the sensing node computing environment and behavior measurement, we can identify and exclude untrusted nodes, so the trusted group can be built. Then the network resources are distributed from a global perspective. Based on the available bandwidth of the link, a network resource fusion model of IPv4 and IPv6 is proposed. On this basis, a global network resource allocation model is further proposed. Afterwards, real-time monitoring of data transmission behavior ensures data security during transmission. Simulation experiments show that this mechanism can effectively optimize the bandwidth allocation in the data transmission process and has little effect on the running efficiency of existing network applications. At the same time, it can effectively guarantee the trust of nodes and achieve trusted data transmission. 展开更多
关键词 internet of THINGS TRUST measurement link BANDWIDTH network resource ALLOCATION data transmission
下载PDF
TrustedMarket:一种基于信任度量理论的智能终端可信软件市场模型
9
作者 平柳琼 《计算机科学》 CSCD 北大核心 2017年第S1期385-389,418,共6页
针对智能终端应用软件市场对上架应用软件审核不严格、第三方软件市场存在大量对合法软件"重新打包"的恶意软件等问题,设计了一种基于信任度量机制的理论建立的可信应用软件市场模型——TrustedMarket。针对智能终端自身计算... 针对智能终端应用软件市场对上架应用软件审核不严格、第三方软件市场存在大量对合法软件"重新打包"的恶意软件等问题,设计了一种基于信任度量机制的理论建立的可信应用软件市场模型——TrustedMarket。针对智能终端自身计算能力、电量和网络流量受限,运行环境复杂的特点,提出了关系成熟度、忠诚度和推荐服务质量的概念用于描述智能终端对外提供的推荐信任值;提出了针对不同配置智能终端分级分类存储信任值的思想;提出了新近特性描述函数用于计算历史忠诚度评价值的权重,较合理地解决了特定信任度量模型中信任值计算的难题。通过在Android平台上实现的TrustedMarket模型,验证了该模型可较好地解决当前应用软件市场不可信的问题。 展开更多
关键词 智能终端 软件市场 信任度量 安卓
下载PDF
基于“四象限模型”的医患信任测量量表构建及初步研究
10
作者 崔明武 王振辉 +5 位作者 赵刚 刘伟 赵红 沈丹薇 张静涛 曹天宇 《中国疗养医学》 2024年第4期1-4,共4页
目的 通过构建适宜我国应用的“四象限模型”医患信任测量量表,评价分析其效度及信度,为改善医患关系提供一定的帮助。方法 本文以国外学者研究的“四象限模型”为理论框架,通过文献回顾、访谈法、德尔菲专家咨询法等多种方式构建“四... 目的 通过构建适宜我国应用的“四象限模型”医患信任测量量表,评价分析其效度及信度,为改善医患关系提供一定的帮助。方法 本文以国外学者研究的“四象限模型”为理论框架,通过文献回顾、访谈法、德尔菲专家咨询法等多种方式构建“四象限模型”医患信任测量量表,将某院作为实际研究的案例,对“四象限模型”医患信任测量量表的信度、效度进行检验。结果 “四象限模型”医患信任测量量表的总Cronbach’s α信度系数为0.912;分半信度R为0.863和0.932;内容效度Pearson相关系数0.38~0.81,均具有统计学意义;结构效度RMR为0.065,RMSEA为0.073,χ~2/df为2.236,GFI为0.791。结论 经过某医院的实证检验,“四象限模型”医患信任测量量表具有较高的信度和较好的效度,可为我国医患信任方面研究提供一个科学的、合理的、有效的并且符合我国国情的医患信任测量量表,在重构医患信任、改善医患关系方面有着广阔的应用前景。 展开更多
关键词 医患信任 四象限模型 测量量表 效度 信度
下载PDF
论“信任”的第三性--测量中的问题
11
作者 刘军 郭佳茵 《社会研究方法评论》 2024年第1期164-188,共25页
量化研究将测量视为对被测“物”的揭示,预设了“语言和实在”(能指与所指)之间的二元关系,也蕴含着“还原论”思维。本文借鉴皮尔士的三元符号观,以信任为例,分析第一性、第二性、第三性概念,认为中文语境下的信任具有“第三性”,不能... 量化研究将测量视为对被测“物”的揭示,预设了“语言和实在”(能指与所指)之间的二元关系,也蕴含着“还原论”思维。本文借鉴皮尔士的三元符号观,以信任为例,分析第一性、第二性、第三性概念,认为中文语境下的信任具有“第三性”,不能被还原为“第二性”,英文语境中的“trust”概念在具体化和操作化测量中只注重“第二性”,无视“第三性”。中文文献所使用的“信任量表”仅简单地借鉴国外信任量表,没有体现出信任概念的第三性,因而不足以揭示和解释中国社会中的信任现象。仅基于第二性来研究信任,也会遮蔽其背后的“三方互制”等更基础的制度议题。因此,如何基于“第三性”来研究信任甚至其他相关概念,是值得深究的一个本土化议题。 展开更多
关键词 测量 所指 信任
下载PDF
基于非接触式电压测量的电压监测系统 被引量:1
12
作者 张泽林 刘希喆 《电子测量与仪器学报》 CSCD 北大核心 2024年第5期229-237,共9页
非接触式电压测量方法不直接与线路的金属导体部分接触,能适应多种应用场景的电压监测。设计一种利用改进的非接触式电压测量技术对线路电压进行测量并将测量得到的电压波形用于线路故障电压诊断的系统。对传统的非接触式电压测量技术... 非接触式电压测量方法不直接与线路的金属导体部分接触,能适应多种应用场景的电压监测。设计一种利用改进的非接触式电压测量技术对线路电压进行测量并将测量得到的电压波形用于线路故障电压诊断的系统。对传统的非接触式电压测量技术进行拓扑分析并对测量电路拓扑进行改进,能够不受耦合电容影响并准确地测量线路上的电压。由于目前单一的故障特征提取方法具有局限性,为了利用由非接触式电压测量技术测量得到的电压波形实现准确地对线路故障电压进行识别诊断,提出了基于集成学习的故障电压状态识别系统,利用多种特征提取方法提取非接触式电压测量得到的电压波形特征,其识别结果用于对线路故障进行预警和处理。针对该电压监测系统,设计了测量精度和故障识别测试,得到稳态平均误差为0.9%,故障识别准确率最高可达到93%,表明该电压监测系统具有较高的精度和故障识别准确率。 展开更多
关键词 非接触式电压测量 离散小波阈值降噪 硬件加速计算 集成学习
下载PDF
共享住宿平台信任建立措施对房客信任的影响研究——以途家为例
13
作者 牛阮霞 宋瑞 《旅游论坛》 2024年第4期67-79,共13页
就共享住宿而言,如何建立用户信任是业界、学界及政府部门共同关注的问题,而现有文献中探究真实情境下共享住宿平台信任建立措施实施效果者甚少。文章以途家为例,在信任建立模型的基础上,构建共享住宿平台房客信任影响因素模型,探讨共... 就共享住宿而言,如何建立用户信任是业界、学界及政府部门共同关注的问题,而现有文献中探究真实情境下共享住宿平台信任建立措施实施效果者甚少。文章以途家为例,在信任建立模型的基础上,构建共享住宿平台房客信任影响因素模型,探讨共享住宿平台信任建立措施中的制度因素、情感因素和认知因素对房客信任的实际影响效果。研究发现:制度因素中的超赞房东、优选PRO房源、评价分数显著正向影响房客信任;情感因素中的即时速订并未对房客信任产生显著的正向影响;认知因素中的房东性别和房东性质显著正向影响房客信任,房东会员时长并未对房客信任产生显著的正向影响。文章拓展了共享住宿用户信任的理论研究,并为共享住宿平台进一步完善信任建立措施提供了科学依据。 展开更多
关键词 共享住宿 信任建立模型 信任建立措施 房客信任
下载PDF
一体化边缘计算安防控制器的设计与应用研究
14
作者 李飞虹 贺定长 +2 位作者 周言 程仁杰 杨红 《自动化博览》 2024年第3期40-43,共4页
本文深入研究了油气场站中一体化边缘计算安防控制器的应用和技术特点,分析了边缘计算在油气行业中的发展现状,并结合实际应用案例和运行数据,探讨了一体化边缘计算安防控制器在油气场站中的优势和挑战,为油气行业的智能化转型提供了理... 本文深入研究了油气场站中一体化边缘计算安防控制器的应用和技术特点,分析了边缘计算在油气行业中的发展现状,并结合实际应用案例和运行数据,探讨了一体化边缘计算安防控制器在油气场站中的优势和挑战,为油气行业的智能化转型提供了理论支持和实践指导。本文还提出了一种一体化边缘计算控制器的设计方案,旨在解决传统中央计算模式存在的延迟高、带宽压力大等问题,并通过对边缘计算安防控制器的硬件架构、软件设计以及实际应用需求的分析,验证了其在提高油气场站监控效率和实时性方面的优势。 展开更多
关键词 油气场站安防 一体化边缘计算安防控制器 中央计算模式 边缘计算 控制器
下载PDF
基于零信任的5G网络切片安全研究
15
作者 项海波 鲍聪颖 +2 位作者 孙健 吴昊 田亚伟 《自动化仪表》 CAS 2024年第2期96-100,105,共6页
随着5G网络的广泛部署和网络切片技术的出现,安全问题逐渐成为5G网络建设中不可忽视的一部分。在5G网络中,传统基于边界的安全防护架构无法满足更高安全需求的挑战,而不再划分信任区域、持续验证的零信任架构逐渐得到认可。分析切片现... 随着5G网络的广泛部署和网络切片技术的出现,安全问题逐渐成为5G网络建设中不可忽视的一部分。在5G网络中,传统基于边界的安全防护架构无法满足更高安全需求的挑战,而不再划分信任区域、持续验证的零信任架构逐渐得到认可。分析切片现有安全技术缺陷,结合软件定义安全边界的思想,设计了基于零信任的切片安全架构。在信任评估中引入基于服务质量参数的可信度量方法,从可用性、可靠性和实时性角度建立可信度量过程,为持续验证用户是否可信、提供细粒度的访问控制决策奠定了基础。试验结果初步验证了可信度量方法的可行性。所设计的零信任网络安全架构和可信度量方法对信息安全防御相关研究和工程技术人员具有借鉴意义。 展开更多
关键词 5G 网络切片 网络安全 零信任 软件定义安全边界 服务质量 可信度量
下载PDF
基于能源枢纽的综合能源信息物理系统安全防护架构研究
16
作者 龚钢军 王路遥 +2 位作者 常卓越 柳旭 邢汇笛 《综合智慧能源》 CAS 2024年第5期65-72,共8页
为了提高综合能源系统(IES)中设备间和能源节点间的能源和信息交互效率,降低能源生产和传输成本,实现多种能源的高效转化与灵活分配,构建了一种基于能源枢纽(EH)的集中-分布式IES架构。基于该IES模型,定义了基于子信息物理系统集群的信... 为了提高综合能源系统(IES)中设备间和能源节点间的能源和信息交互效率,降低能源生产和传输成本,实现多种能源的高效转化与灵活分配,构建了一种基于能源枢纽(EH)的集中-分布式IES架构。基于该IES模型,定义了基于子信息物理系统集群的信息物理系统,在信息侧提出了能源枢纽节点内部每个子信息物理系统运行模型以及基于子信息系统服务器的信息交互模型。计及IES中信息安全问题对系统可靠性的影响,结合不同类型能源互补、能源网络传输分配、储能和清洁能源动态接入等系统运行特性,分析了综合能源信息物理系统安全需求,并基于可信计算技术构建了一种三元三层可信安全防护架构。从各能源节点为入手点,该防护体系形成了基于节点可信、网络连接可信和应用可信的防护机制,以确保IES安全可靠运行。 展开更多
关键词 综合能源系统 信息物理系统 能源互补 储能 清洁能源 安全防护架构 可信计算
下载PDF
一种基于聚合与关联智能合约的电子证照访问控制方法
17
作者 朱克 玄佳兴 薛文昊 《计算机与现代化》 2024年第6期103-108,共6页
随着“互联网+政务服务”深入推进,电子证照应用进入了快速建设期。在电子证照管理中,不同的业务需由专门的单位来完成,在传递过程中需要确认参与者的身份并且不能对外泄露。针对电子证照管理的业务特点,本文提出一种基于区块链的可信... 随着“互联网+政务服务”深入推进,电子证照应用进入了快速建设期。在电子证照管理中,不同的业务需由专门的单位来完成,在传递过程中需要确认参与者的身份并且不能对外泄露。针对电子证照管理的业务特点,本文提出一种基于区块链的可信身份电子证照管理系统与访问控制方法。该方法基于模糊测度,采用多属性聚合算子,通过对用户属性进行聚类评价,从而对用户权限进行访问控制,建立用户权限校验证书和基于使用场景的证照加密,实现电子证照管理在区块链环境下的用户身份可信任、证照防篡改和隐私防泄漏。 展开更多
关键词 区块链 可信身份 访问控制 电子证照 模糊测度
下载PDF
基于主动标识载体的“工业互联网+绿色低碳”可信碳计量研究
18
作者 张路争 《节能与环保》 2024年第7期72-78,共7页
本文结合我国标识解析体系、碳计量体系的实际情况,开展了基于主动标识载体的“工业互联网+绿色低碳”可信碳计量研究,提出可信碳计量体系架构、建设思路,并对应用场景进行了思考,为工业互联网创新发展、碳计量体系建设提供参考。
关键词 标识解析 工业互联网 绿色低碳 可信碳计量
下载PDF
零信任理念下企业网络计量系统防护体系构建
19
作者 边旭 《软件》 2024年第4期172-174,共3页
当前,企业数字化转型快速发展。前沿的、普遍应用的信息技术不但提升了企业的运作效能,也向企业提出了严峻的安全挑战。基于网络边界的计量体系无法充分适应数字化改造企业的访问控制需要,因此,业界提出零信任理念。本文分析了数字化转... 当前,企业数字化转型快速发展。前沿的、普遍应用的信息技术不但提升了企业的运作效能,也向企业提出了严峻的安全挑战。基于网络边界的计量体系无法充分适应数字化改造企业的访问控制需要,因此,业界提出零信任理念。本文分析了数字化转型产业面临的安全风险挑战,提出基于零信任理念的计量系统防护体系。按照零信任的核心理念,在辨识、防护、检测和反馈四大方面建立了一个全新的计量系统防御系统。 展开更多
关键词 零信任理念 企业转型 计量系统防护体系 安全风险
下载PDF
可信计算在国产操作系统下的应用及测试方法探究
20
作者 夏侯振宇 高妹 刘浪 《工业信息安全》 2024年第1期63-69,共7页
本文首先详细介绍了可信计算的基本概念和发展的三个阶段。接着,对可信计算的应用模式进行分析,并调研国内外在可信计算方面的研究现状。随后,以国产可信安全操作系统和国产CPU自主可信计算体系结构为例,详细介绍了国产操作系统在可信... 本文首先详细介绍了可信计算的基本概念和发展的三个阶段。接着,对可信计算的应用模式进行分析,并调研国内外在可信计算方面的研究现状。随后,以国产可信安全操作系统和国产CPU自主可信计算体系结构为例,详细介绍了国产操作系统在可信计算方面的发展现状。最后,对可信度量及相关的可信度量模型和验证方法进行介绍,阐述相关测试方法。本文从基本概念出发,对可信计算进行深入分析,阐述国产可信计算中以国产操作系统搭配国产CPU处理器的可信技术体系,并对可信计算的未来发展方向做出展望。 展开更多
关键词 可信计算 安全 可信计算体系 可信度量
下载PDF
上一页 1 2 21 下一页 到第
使用帮助 返回顶部