[1]陈建勋 侯方勇 李磊.可信计算研究[J].计算机技术与发展,2010,(09):1-4.
 CHEN Jian-xun,HOU Fang-yong,LI Lei.A Review of Trusted Computing[J].,2010,(09):1-4.
点击复制

可信计算研究()
分享到:

《计算机技术与发展》[ISSN:1006-6977/CN:61-1281/TN]

卷:
期数:
2010年09期
页码:
1-4
栏目:
智能、算法、系统工程
出版日期:
1900-01-01

文章信息/Info

Title:
A Review of Trusted Computing
文章编号:
1673-629X(2010)09-0001-04
作者:
陈建勋 侯方勇 李磊
国防科技大学计算机学院
Author(s):
CHEN Jian-xunHOU Fang-yongLI Lei
School of Computer,National University of Defence Technology
关键词:
可信计算可信模块可信软件协议栈可信终端信任链
Keywords:
trusted computing trusted platform module TCG software stack trusted terminal trusted chain
分类号:
TP393.08
文献标志码:
A
摘要:
网络中存在的各种隐患已经严重威胁到信息安全,网络攻击越来越趋于隐蔽化,攻击手法趋于复杂化,并且新的攻击手段不断更新,传统网络防护技术尽管也在不断发展,但已显得力不从心。可信计算的思想是从内部入手,从根源上防止各种安全隐患问题的发生。为对可信计算研究现状有一个直观的认识,提出了对"可信计算"体系结构的看法,详细介绍了可信计算终端的概念、特点和原理机制,对可信终端关键部件的结构和特点进行了描述。综述了可信计算在国内外的研究进展情况及目前可信计算的研究内容,并结合已有研究成果,对可信计算未来的研究方向进行了展望
Abstract:
A variety of hidden dangers that exist in the network has been a serious threat to information security,network attacks are increasingly covert,attack methods become more complicated,and the new means of attack constantly updated,traditional network protection technology,although also growing,but it has become inadequate.Trusted computing idea is to start from within,from the root causes of the problem to prevent the occurrence of a variety of security risks.To have a direct-viewing understanding to trusted computing research,present the"trusted computing" architecture views,introduced in detail the trusted computing terminal's concept,characteristics and principles of mechanisms,have carried on the description to the trusted computing terminal key component's structure and characteristics.Summarized the trusted computing in the domestic and foreign research development situation and the present trusted computing research content,and to integrate existing research results,future research on trusted computing direction was predicted

相似文献/References:

[1]李超 王红胜 陈军广 孙蕊.加强计算机终端信息安全的两种解决方案[J].计算机技术与发展,2009,(01):165.
 LI Chao,WANG Hong-sheng,CHEN Jun-guang,et al.Two Solutions to Strengthen Computer's Terminal Information Security[J].,2009,(09):165.
[2]张珂.新型可信计算平台体系结构研究[J].计算机技术与发展,2011,(07):153.
 ZHANG Ke.New Trusted Computing Platform Architecture[J].,2011,(09):153.
[3]禹蒲阳 康国胜.可信计算的研究与发展[J].计算机技术与发展,2011,(08):233.
 YU Pu-yang,KANG Guo-sheng.Research and Development of Trusted Computing[J].,2011,(09):233.
[4]费稼轩 张涛 林为民 陈亚东 曾荣.基于动态可信度量的敏感信息安全控制模型[J].计算机技术与发展,2012,(05):237.
 FEI Jia-xuan,ZHANG Tao,LIN Wei-min,et al.Secure Control Model of Sensitive Information Based on Dynamic Trust Measurement[J].,2012,(09):237.
[5]陈亚东,张涛,曾荣,等.输电线路在线监测可信接入系统设计[J].计算机技术与发展,2013,(05):113.
 CHEN Ya-dong,ZHANG Tao,ZENG Rong,et al.Design of Trusted Access System for Transmission Line Monitoring[J].,2013,(09):113.
[6]张丽娟,吴振强.一种可控可信匿名的物联网查询机制[J].计算机技术与发展,2013,(06):122.
 ZHANG Li-juan,WU Zhen-qiang.A Controllable Trusted and Anonymous Query Mechanism of Internet of Things[J].,2013,(09):122.
[7]张弢,任帅,张德刚[].基于可信计算的Ad Hoc网络直接匿名证明[J].计算机技术与发展,2014,24(04):147.
 ZHANG Tao[],REN Shuai[],ZHANG De-gang[].Direct Anonymous Attestation to Ad Hoc Networks Based on Trusted Computing[J].,2014,24(09):147.
[8]周毅[],贾佳[],廖军[],等. 基于进化理论的可信计算环境实现[J].计算机技术与发展,2014,24(07):99.
 ZHOU Yi[],JIA Jia[],LIAO Jun[],et al. Implementation of Trusted Computing Environment Based on Evolutionary Theory[J].,2014,24(09):99.
[9]赵斌[],杨明华[],柳伟[],等. 基于龙芯处理器的自主可信计算机研究[J].计算机技术与发展,2015,25(03):126.
 ZHAO Bin[],YANG Ming-hua[],LIU Wei[],et al. Research on Security & Trust Computer Based on Loongson CPU[J].,2015,25(09):126.
[10]易平,庄毅.基于龙芯处理器的嵌入式可信解决方案[J].计算机技术与发展,2018,28(05):112.[doi:10.3969/ j. issn.1673-629X.2018.05.026]
 YI Ping,ZHUANG Yi.Design and Implementation of Embedded Trusted Platform Based on LOONGSON Processor[J].,2018,28(09):112.[doi:10.3969/ j. issn.1673-629X.2018.05.026]

备注/Memo

备注/Memo:
国家自然科学基金(60903040); 国防科技大学预研项目(JC08-06-01)陈建勋(1980-),男,陕西西安人,硕士研究生,研究方向为可信计算;侯方勇,博士,副教授,研究方向为计算机体系结构、射频技术等
更新日期/Last Update: 1900-01-01