The trust measurement scheme in trusted computing

被引:0
|
作者
Zhang, Li-Qiang [1 ,2 ]
Zhang, Huan-Guo [2 ,3 ]
Zhang, Fan [4 ]
机构
[1] State Key Lab of Software Engineering, Wuhan University, Wuhan 430072, China
[2] Computer School, Wuhan University, Wuhan 430072, China
[3] Key Lab of Aerospace Information Security and Trusted Computing, Wuhan University, Wuhan 430072, China
[4] College of Communication Engineering, Hangzhou Dianzi University, Hangzhou 310018, China
关键词
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
页码:586 / 591
相关论文
共 50 条
  • [21] Privacy Preserving of Trust Management Credentials Based on Trusted Computing
    Wu, Bin
    Feng, Dengguo
    Duan, Meijiao
    INFORMATION SECURITY PRACTICE AND EXPERIENCE, PROCEEDINGS, 2010, 6047 : 251 - 263
  • [22] Trusted Computing Based Mobile DRM Authentication Scheme
    Yang, Zhen
    Fan, Kefeng
    Lai, Yingxu
    FIFTH INTERNATIONAL CONFERENCE ON INFORMATION ASSURANCE AND SECURITY, VOL 1, PROCEEDINGS, 2009, : 7 - +
  • [23] A Trusted Measurement Scheme for Wireless Sensor Networks
    Yang, Lei
    Shi, Ying
    Tang, Jinyi
    PROCEEDINGS OF 2015 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATION SOFTWARE AND NETWORKS (ICCSN), 2015, : 277 - 281
  • [24] Quantitative assignment of the grid behavior trust model based on trusted computing
    Liu, Lizhao
    Wei, Peng
    Wang, Ying
    Li, Maoqing
    Wuhan Daxue Xuebao (Xinxi Kexue Ban)/ Geomatics and Information Science of Wuhan University, 2010, 35 (05): : 587 - 590
  • [25] Research of Mobile Agent Trust Management Model in Trusted Computing Environment
    Chen, Aili
    Wu, Xiaoping
    2010 6TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS NETWORKING AND MOBILE COMPUTING (WICOM), 2010,
  • [26] In Law We Trust? Trusted Computing and Legal Responsibility for Internet Security
    Danidou, Yianna
    Schafer, Burkhard
    EMERGING CHALLENGES FOR SECURITY, PRIVACY AND TRUST: 24TH IFIP TC 11 INTERNATIONAL INFORMATION SECURITY CONFERENCE, SEC 2009, PROCEEDINGS, 2009, 297 : 399 - 409
  • [27] Trust Management for Mobile Agent System Based on Trusted Computing Platforms
    Shen, Zhidong
    Wu, Xiaoping
    Zhan, Jing
    2010 IEEE INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND INFORMATION SECURITY (WCNIS), VOL 1, 2010, : 717 - +
  • [28] In Search of Trust: 30 Years of Evolution of Trusted Computing and Hardware Security
    Vishik, Claire
    PROCEEDINGS OF THE 2023 WORKSHOP ON ATTACKS AND SOLUTIONS IN HARDWARE SECURITY, ASHES 2023, 2023, : 1 - 1
  • [29] Research on Behavior Trust Based on Bayesian Inference in Trusted Computing Networks
    Liu, Wei
    Ci, Linlin
    Liu, Liping
    2015 IEEE INTERNATIONAL CONFERENCE ON SMART CITY/SOCIALCOM/SUSTAINCOM (SMARTCITY), 2015, : 1134 - 1138
  • [30] Dynamic Integrity Measurement Model Based on Trusted Computing
    Liu, Changping
    Fan, Mingyu
    Feng, Yong
    Wang, Guangwei
    2008 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY, VOLS 1 AND 2, PROCEEDINGS, 2008, : 281 - 284