The trust measurement scheme in trusted computing

被引:0
|
作者
Zhang, Li-Qiang [1 ,2 ]
Zhang, Huan-Guo [2 ,3 ]
Zhang, Fan [4 ]
机构
[1] State Key Lab of Software Engineering, Wuhan University, Wuhan 430072, China
[2] Computer School, Wuhan University, Wuhan 430072, China
[3] Key Lab of Aerospace Information Security and Trusted Computing, Wuhan University, Wuhan 430072, China
[4] College of Communication Engineering, Hangzhou Dianzi University, Hangzhou 310018, China
关键词
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
页码:586 / 591
相关论文
共 50 条
  • [31] A User Authentication Scheme Based on Trusted Platform for Cloud Computing
    Mo, Jiaqing
    Hu, Zhongwang
    Lin, Yuhua
    SECURITY, PRIVACY, AND ANONYMITY IN COMPUTATION, COMMUNICATION, AND STORAGE, 2016, 10066 : 122 - 130
  • [32] An Improved Scheme of μTESLA Authentication based Trusted Computing Platform
    Du, Ruiying
    Wen, Song
    2008 4TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-31, 2008, : 4711 - 4714
  • [33] WLAN Mesh security association scheme in trusted computing environment
    Xiao, Yue-Lei
    Wang, Yu-Min
    Pang, Liao-Jun
    Tan, Shi-Chong
    Tongxin Xuebao/Journal on Communications, 2014, 35 (07): : 94 - 103
  • [34] A Multi Trust Chain Scheme in Trusted Cross-Domain Interaction
    Tian, Liye
    Jiang, Wei
    2012 INTERNATIONAL CONFERENCE ON INDUSTRIAL CONTROL AND ELECTRONICS ENGINEERING (ICICEE), 2012, : 550 - 553
  • [35] TMS: Visual Monitoring of Trusted Platform Board for Trust Computing based on Web
    Seo, Se-Kwang
    Baek, Sung-Jin
    Lee, Chang-Wu
    Kim, Sung-Won
    Park, Sun-Mi
    Jeong, Young-Sik
    PROCEEDINGS OF THE 2009 FOURTH INTERNATIONAL CONFERENCE ON EMBEDDED AND MULTIMEDIA COMPUTING, 2009, : 67 - +
  • [36] Testing on trust chain of trusted computing platform based on labeled transition system
    Xu, Ming-Di
    Zhang, Huan-Guo
    Yan, Fei
    Jisuanji Xuebao/Chinese Journal of Computers, 2009, 32 (04): : 635 - 645
  • [37] Towards Improved Trust in Threat Intelligence Sharing using Blockchain and Trusted Computing
    Wu, Yichang
    Qiao, Yuansong
    Ye, Yuhang
    Lee, Brian
    2019 SIXTH INTERNATIONAL CONFERENCE ON INTERNET OF THINGS: SYSTEMS, MANAGEMENT AND SECURITY (IOTSMS), 2019, : 474 - 481
  • [38] Seal-based secure boot scheme for trusted computing platform
    Song C.
    Peng W.-P.
    Xin Y.
    Luo S.-S.
    Zhu H.-L.
    Journal of China Universities of Posts and Telecommunications, 2010, 17 (SUPPL. 2): : 16 - 21
  • [39] A Trusted Consensus Scheme for Collaborative Learning in the Edge AI Computing Domain
    Wang, Ke
    Xu, Ship Peng
    Chen, Chien-Ming
    Islam, S. K. Hafizul
    Hassan, Mohammad Mehedi
    Savaglio, Claudio
    Pace, Pasquale
    Aloi, Gianluca
    IEEE NETWORK, 2021, 35 (01): : 204 - 210
  • [40] A formal method based on noninterference for analyzing trust chain of trusted computing platform
    Zhang X.
    Huang Q.
    Shen C.-X.
    Jisuanji Xuebao/Chinese Journal of Computers, 2010, 33 (01): : 74 - 81