[1]禹蒲阳 康国胜.可信计算的研究与发展[J].计算机技术与发展,2011,(08):233-236.
 YU Pu-yang,KANG Guo-sheng.Research and Development of Trusted Computing[J].,2011,(08):233-236.
点击复制

可信计算的研究与发展()
分享到:

《计算机技术与发展》[ISSN:1006-6977/CN:61-1281/TN]

卷:
期数:
2011年08期
页码:
233-236
栏目:
安全与防范
出版日期:
1900-01-01

文章信息/Info

Title:
Research and Development of Trusted Computing
文章编号:
1673-629X(2011)08-0233-04
作者:
禹蒲阳 康国胜
湖南科技大学知识处理与网络化制造湖南省普通高校重点实验室
Author(s):
YU Pu-yangKANG Guo-sheng
Hunan Province Key Laboratory of Knowledge Processing and Networked Manufacture,Hunan University of Science and Technology
关键词:
可信计算可信计算平台可信平台模块可信支撑软件
Keywords:
trusted computing trusted computing platform trusted platform module trust software stack
分类号:
TP311
文献标志码:
A
摘要:
传统信息安全系统以防外部入侵为主,与现今信息安全的主要威胁来自内部的实际不符合。可信计算由内部防护,从根源上防止各种安全隐患问题的发生,成为信息安全研究的一个新阶段。其主要思想是将安全芯片嵌入到计算机硬件设备平台中,利用平台的安全特性来保障安全。概述了可信计算的研究背景及其基本概念,分析了国内外发展现状和可信计算对产业界带来的影响,最后针对可信计算的发展现状进行了展望以及对可信计算的重点研究问题与研究方法进行了思考
Abstract:
Traditional system of information security focuses on external invasion,which can not solve the practical situation of that the main menace in current information security systems comes from the inside.Trusted computing is to start from the within,from the courses of the problem to prevent the occurrence of a variety of security risks,making it become the new stage of information security.Its main idea is that the whole system's security is greatly improved via bringing security chip architecture in the computing hardware platform.In this paper,the background and basic concepts of trusted computing are introduced in detail,and its development both at home and abroad,and effects on industrial circles are presented.At last,a prospect about the development of trusted computing is made and the key research issues and research methods are given

相似文献/References:

[1]李熊达 何利.基于自动信任协商的可信网络研究[J].计算机技术与发展,2009,(09):150.
 LI Xiong-da,HE Li.Study of Trusted Network Based on Automated Trust Negotiation[J].,2009,(08):150.
[2]李超 王红胜 陈军广 孙蕊.加强计算机终端信息安全的两种解决方案[J].计算机技术与发展,2009,(01):165.
 LI Chao,WANG Hong-sheng,CHEN Jun-guang,et al.Two Solutions to Strengthen Computer's Terminal Information Security[J].,2009,(08):165.
[3]陈建勋 侯方勇 李磊.可信计算研究[J].计算机技术与发展,2010,(09):1.
 CHEN Jian-xun,HOU Fang-yong,LI Lei.A Review of Trusted Computing[J].,2010,(08):1.
[4]张珂.新型可信计算平台体系结构研究[J].计算机技术与发展,2011,(07):153.
 ZHANG Ke.New Trusted Computing Platform Architecture[J].,2011,(08):153.
[5]费稼轩 张涛 林为民 陈亚东 曾荣.基于动态可信度量的敏感信息安全控制模型[J].计算机技术与发展,2012,(05):237.
 FEI Jia-xuan,ZHANG Tao,LIN Wei-min,et al.Secure Control Model of Sensitive Information Based on Dynamic Trust Measurement[J].,2012,(08):237.
[6]陈亚东,张涛,曾荣,等.输电线路在线监测可信接入系统设计[J].计算机技术与发展,2013,(05):113.
 CHEN Ya-dong,ZHANG Tao,ZENG Rong,et al.Design of Trusted Access System for Transmission Line Monitoring[J].,2013,(08):113.
[7]张丽娟,吴振强.一种可控可信匿名的物联网查询机制[J].计算机技术与发展,2013,(06):122.
 ZHANG Li-juan,WU Zhen-qiang.A Controllable Trusted and Anonymous Query Mechanism of Internet of Things[J].,2013,(08):122.
[8]张弢,任帅,张德刚[].基于可信计算的Ad Hoc网络直接匿名证明[J].计算机技术与发展,2014,24(04):147.
 ZHANG Tao[],REN Shuai[],ZHANG De-gang[].Direct Anonymous Attestation to Ad Hoc Networks Based on Trusted Computing[J].,2014,24(08):147.
[9]周毅[],贾佳[],廖军[],等. 基于进化理论的可信计算环境实现[J].计算机技术与发展,2014,24(07):99.
 ZHOU Yi[],JIA Jia[],LIAO Jun[],et al. Implementation of Trusted Computing Environment Based on Evolutionary Theory[J].,2014,24(08):99.
[10]赵斌[],杨明华[],柳伟[],等. 基于龙芯处理器的自主可信计算机研究[J].计算机技术与发展,2015,25(03):126.
 ZHAO Bin[],YANG Ming-hua[],LIU Wei[],et al. Research on Security & Trust Computer Based on Loongson CPU[J].,2015,25(08):126.

备注/Memo

备注/Memo:
湖南省软科学研究计划项目(2006JT2003); 湘潭市科技计划项目(JZ200738)禹蒲阳(1973-),女,工程师,硕士,主要研究方向为多媒体技术、人机交互技术;康国胜,硕士研究生,主要研究方向为服务计算
更新日期/Last Update: 1900-01-01