Security communication model for vehicular clouds based on trusted computing

被引:0
|
作者
Zhang, Wenbo [1 ,2 ]
Bao, Zhenshan [1 ]
Li, Jian [1 ,2 ]
Zhan, Jing [1 ,2 ]
机构
[1] [1,Zhang, Wenbo
[2] Bao, Zhenshan
[3] 1,Li, Jian
[4] 1,Zhan, Jing
来源
Zhang, Wenbo (zhangwenbo@bjut.edu.cn) | 1600年 / Huazhong University of Science and Technology卷 / 42期
关键词
12;
D O I
10.13245/j.hust.141119
中图分类号
学科分类号
摘要
引用
收藏
页码:102 / 105
相关论文
共 50 条
  • [1] A multi-level security model based on trusted computing
    Jia, Zhao
    Liu Ji-qiang
    Jing, Chen
    PROCEEDINGS OF THE FIRST INTERNATIONAL SYMPOSIUM ON DATA, PRIVACY, AND E-COMMERCE, 2007, : 448 - +
  • [2] Trusted computing platform based executable code security inspecting model
    Chen, Ze-Mao
    Tang, Wei-Min
    Zhou, Li-Bing
    Liu, Jing-Chao
    Shen, Chang-Xiang
    Tongxin Xuebao/Journal on Communications, 2007, 28 (SUPPL.): : 112 - 116
  • [3] Security Model Research Based on Trusted Computing in Ad Hoc Network
    Lin Zhuying
    Liu Xiaojie
    Lu Lin
    Shi Lei
    Xie Gang
    CHINA COMMUNICATIONS, 2011, 8 (04) : 1 - 10
  • [4] Research on ATN-based trusted cloud computing security model
    Yang, Shaoyu
    Wang, Shiqing
    Journal of Information and Computational Science, 2012, 9 (18): : 5945 - 5952
  • [5] Security strategy of DRM based on trusted computing
    Yan, Jianhong
    Peng, Xinguang
    Journal of Computational Information Systems, 2011, 7 (09): : 3226 - 3234
  • [6] A scheme based on trusted computing for terminal security
    Zhang, Jun
    Liu, Wei-peng
    Zhou, Zheng
    Li, Jian
    PROCEEDINGS OF THE FIRST INTERNATIONAL SYMPOSIUM ON DATA, PRIVACY, AND E-COMMERCE, 2007, : 218 - +
  • [7] Trusted Model for Virtual Machine Security in Cloud Computing
    Narayana, K. Sathya
    Pasupuleti, Syam Kumar
    PROGRESS IN COMPUTING, ANALYTICS AND NETWORKING, ICCAN 2017, 2018, 710 : 655 - 665
  • [8] An information flow security model to trusted computing system
    Hu Jun
    Shen Changxiang
    PROCEEDINGS OF THE FIRST INTERNATIONAL SYMPOSIUM ON DATA, PRIVACY, AND E-COMMERCE, 2007, : 310 - +
  • [9] A Trusted Remote Attestation Model based on Trusted Computing
    Yu, Yue
    Wang, Huaimin
    Liu, Bo
    Yin, Gang
    2013 12TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2013), 2013, : 1504 - 1509
  • [10] A novel trusted computing model for network security authentication
    Xing, Ling
    Jiang, Ling
    Yang, Guohai
    Wen, Bin
    Journal of Networks, 2014, 9 (02) : 339 - 343