[1]周毅[],贾佳[],廖军[],等. 基于进化理论的可信计算环境实现[J].计算机技术与发展,2014,24(07):99-103.
 ZHOU Yi[],JIA Jia[],LIAO Jun[],et al. Implementation of Trusted Computing Environment Based on Evolutionary Theory[J].,2014,24(07):99-103.
点击复制

 基于进化理论的可信计算环境实现()
分享到:

《计算机技术与发展》[ISSN:1006-6977/CN:61-1281/TN]

卷:
24
期数:
2014年07期
页码:
99-103
栏目:
智能、算法、系统工程
出版日期:
2014-07-10

文章信息/Info

Title:
 Implementation of Trusted Computing Environment Based on Evolutionary Theory
文章编号:
1673-629X(2014)07-0099-04
作者:
 周毅[1]贾佳[2]廖军[2]肖征荣[2]
1.中国软件评测中心;2.中国联通研究院,
Author(s):
 ZHOU Yi[1]JIA Jia[2]LIAO Jun[2]XIAO Zheng-rong[2]
关键词:
 可信计算可信计算环境进化理论
Keywords:
 trusted computingtrusted computing environmentevolutionary theory
分类号:
TP301
文献标志码:
A
摘要:
 文中对可信计算环境进行分析,提出了可信计算环境的公理系统。在综合研究了生物科学中的进化理论后给出了可信计算环境的进化方式:提出了基于用进废退的信任输入模型、基于人的选择的信任收敛模型、基于点断平衡论的信任模型;实现了基于进化理论的可信计算环境。仿真结果表明,可信计算环境的进化为可信计算的发展提供了理论依据,可以使可信计算环境适应变化的输入,并且收敛其信任值,对所有用户进行公正处理,进而高效率低代价就可以构建可信计算环境。
Abstract:
 Analyze the trusted computing environment,and propose an axiom system of trusted computing environment. After the compre-hensive study of the theory of evolution in the biological sciences,give the evolution formula of trusted computing environment,including an input trust model based on use and disuse theory,a convergence trust model based on people’ s choice,and a trust model based on the theory of punctuated equilibrium. Implement the trusted computing environment based on evolutionary theory. The simulation shows that the evolution of trusted computing environment provides a theoretical basis for the development of trusted computing,enables it to adapt to changing and even unknown input,obtaining the convergence of the trust value of trusted computing environment and making it fair for all users. Also,the evolution of trusted computing environment implements trusted computing with a smaller cost.

相似文献/References:

[1]李超 王红胜 陈军广 孙蕊.加强计算机终端信息安全的两种解决方案[J].计算机技术与发展,2009,(01):165.
 LI Chao,WANG Hong-sheng,CHEN Jun-guang,et al.Two Solutions to Strengthen Computer's Terminal Information Security[J].,2009,(07):165.
[2]陈建勋 侯方勇 李磊.可信计算研究[J].计算机技术与发展,2010,(09):1.
 CHEN Jian-xun,HOU Fang-yong,LI Lei.A Review of Trusted Computing[J].,2010,(07):1.
[3]张珂.新型可信计算平台体系结构研究[J].计算机技术与发展,2011,(07):153.
 ZHANG Ke.New Trusted Computing Platform Architecture[J].,2011,(07):153.
[4]禹蒲阳 康国胜.可信计算的研究与发展[J].计算机技术与发展,2011,(08):233.
 YU Pu-yang,KANG Guo-sheng.Research and Development of Trusted Computing[J].,2011,(07):233.
[5]费稼轩 张涛 林为民 陈亚东 曾荣.基于动态可信度量的敏感信息安全控制模型[J].计算机技术与发展,2012,(05):237.
 FEI Jia-xuan,ZHANG Tao,LIN Wei-min,et al.Secure Control Model of Sensitive Information Based on Dynamic Trust Measurement[J].,2012,(07):237.
[6]陈亚东,张涛,曾荣,等.输电线路在线监测可信接入系统设计[J].计算机技术与发展,2013,(05):113.
 CHEN Ya-dong,ZHANG Tao,ZENG Rong,et al.Design of Trusted Access System for Transmission Line Monitoring[J].,2013,(07):113.
[7]张丽娟,吴振强.一种可控可信匿名的物联网查询机制[J].计算机技术与发展,2013,(06):122.
 ZHANG Li-juan,WU Zhen-qiang.A Controllable Trusted and Anonymous Query Mechanism of Internet of Things[J].,2013,(07):122.
[8]张弢,任帅,张德刚[].基于可信计算的Ad Hoc网络直接匿名证明[J].计算机技术与发展,2014,24(04):147.
 ZHANG Tao[],REN Shuai[],ZHANG De-gang[].Direct Anonymous Attestation to Ad Hoc Networks Based on Trusted Computing[J].,2014,24(07):147.
[9]张志宏,吴庆波,邵立松,等.基于飞腾平台TOE协议栈的设计与实现[J].计算机技术与发展,2014,24(07):1.
 ZHANG Zhi-hong,WU Qing-bo,SHAO Li-song,et al. Design and Implementation of TCP/IP Offload Engine Protocol Stack Based on FT Platform[J].,2014,24(07):1.
[10]梁文快,李毅. 改进的基因表达算法对航班优化排序问题研究[J].计算机技术与发展,2014,24(07):5.
 LIANG Wen-kuai,LI Yi. Research on Optimization of Flight Scheduling Problem Based on Improved Gene Expression Algorithm[J].,2014,24(07):5.
[11]赵斌[],杨明华[],柳伟[],等. 基于龙芯处理器的自主可信计算机研究[J].计算机技术与发展,2015,25(03):126.
 ZHAO Bin[],YANG Ming-hua[],LIU Wei[],et al. Research on Security & Trust Computer Based on Loongson CPU[J].,2015,25(07):126.
[12]易平,庄毅.基于龙芯处理器的嵌入式可信解决方案[J].计算机技术与发展,2018,28(05):112.[doi:10.3969/ j. issn.1673-629X.2018.05.026]
 YI Ping,ZHUANG Yi.Design and Implementation of Embedded Trusted Platform Based on LOONGSON Processor[J].,2018,28(07):112.[doi:10.3969/ j. issn.1673-629X.2018.05.026]

更新日期/Last Update: 2015-03-13