Development of Trusted Computing Research

被引:9
|
作者
ZHANG Huanguo~ 1
2. State Key Laboratory of Software Engineering
机构
关键词
computer; trusted computing; secure computer; information security;
D O I
暂无
中图分类号
TP309 [安全保密];
学科分类号
081201 ; 0839 ; 1402 ;
摘要
Trusted computing is the new trend of information security today. This paper surveys the theory and technology of trusted computing. The development history of trusted computing, and the development of trusted computing in China are introduced in this paper,and then it analyzes some problems of trusted computing at present which are delay in theory research, some key technologies to be developed and lack of trusted software system. Some fields are worthy to be explored on are pointed out including key technology, basic theory and application in trusted computing.
引用
收藏
页码:1407 / 1413
页数:7
相关论文
共 50 条
  • [1] Research on trusted computing and its development
    Shen ChangXiang
    Zhang HuanGuo
    Wang HuaiMin
    Wang Ji
    Zhao Bo
    Yan Fei
    Yu FaJiang
    Zhang LiQiang
    Xu MingDi
    SCIENCE CHINA-INFORMATION SCIENCES, 2010, 53 (03) : 405 - 433
  • [2] Research on trusted computing and its development
    ChangXiang Shen
    HuanGuo Zhang
    HuaiMin Wang
    Ji Wang
    Bo Zhao
    Fei Yan
    FaJiang Yu
    LiQiang Zhang
    MingDi Xu
    Science China Information Sciences, 2010, 53 : 405 - 433
  • [3] Research on trusted computing and its development
    SHEN ChangXiang1
    2School of Computer
    3School of Computer
    Science China(Information Sciences), 2010, 53 (03) : 405 - 433
  • [4] Research on trusted storage based on trusted computing platform
    School of Computer, Wuhan University, Wuhan 430072, China
    不详
    Tongxin Xuebao, 2007, SUPPL. (117-120):
  • [5] Research and Design of Trusted Computing Platform
    Zhou Yun-ting
    Deng Mao-lin
    Chong Yu-hai
    Ji Feng-zhu
    He Xiao-gang
    Tang Qi-jie
    PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON ADVANCES IN MECHANICAL ENGINEERING AND INDUSTRIAL INFORMATICS (AMEII 2016), 2016, 73 : 1183 - 1188
  • [6] The research of Trusted Computing based on the model of trusted Meta data of BSCM
    Zhong, Liu
    2008 FOURTH INTERNATIONAL CONFERENCE ON INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING, PROCEEDINGS, 2008, : 941 - 945
  • [7] Research on trusted Access in edge computing environment
    Liang, Zheheng
    Zhang, Xiaolu
    Zhang, Jinbo
    Zeng, Jijun
    Long, Zhenyue
    2022 IEEE 6TH ADVANCED INFORMATION TECHNOLOGY, ELECTRONIC AND AUTOMATION CONTROL CONFERENCE (IAEAC), 2022, : 240 - 244
  • [8] Research on Trust Model Based on Behavior and Trusted Computing
    Gu Yue-sheng
    Chen Jun
    Wang Yan-rong
    PROGRESS IN MEASUREMENT AND TESTING, PTS 1 AND 2, 2010, 108-111 : 1259 - 1263
  • [9] Analysis and Research of Remote Attestation Based on Trusted Computing
    Guo, Jiaming
    Wei, Jiang
    2013 FOURTH INTERNATIONAL CONFERENCE ON DIGITAL MANUFACTURING AND AUTOMATION (ICDMA), 2013, : 192 - 195
  • [10] Research on Storage Security Based on Trusted Computing Platform
    He, Jian
    Xu, Mingdi
    PROCEEDINGS OF THE INTERNATIONAL SYMPOSIUM ON ELECTRONIC COMMERCE AND SECURITY, 2008, : 448 - +