Development of Trusted Computing Research

被引:9
|
作者
ZHANG Huanguo~ 1
2. State Key Laboratory of Software Engineering
机构
关键词
computer; trusted computing; secure computer; information security;
D O I
暂无
中图分类号
TP309 [安全保密];
学科分类号
081201 ; 0839 ; 1402 ;
摘要
Trusted computing is the new trend of information security today. This paper surveys the theory and technology of trusted computing. The development history of trusted computing, and the development of trusted computing in China are introduced in this paper,and then it analyzes some problems of trusted computing at present which are delay in theory research, some key technologies to be developed and lack of trusted software system. Some fields are worthy to be explored on are pointed out including key technology, basic theory and application in trusted computing.
引用
收藏
页码:1407 / 1413
页数:7
相关论文
共 50 条
  • [21] Pervasive Trusted Computing
    Balfe, Shane
    Li, Shiqun
    Zhou, Jianying
    SECOND INTERNATIONAL WORKSHOP ON SECURITY, PRIVACY AND TRUST IN PERVASIVE AND UBIQUITOUS COMPUTING, PROCEEDINGS, 2006, : 88 - +
  • [22] Trusted computing in context
    Schneider, Fred B.
    IEEE SECURITY & PRIVACY, 2007, 5 (02) : 4 - 5
  • [23] Trusted computing for infrastructure
    1600, Telefonaktiebolaget L.M. Ericsson (91):
  • [24] Modeling Trusted Computing
    CHEN Shuyi
    Wuhan University Journal of Natural Sciences, 2006, (06) : 1507 - 1510
  • [25] Trusted computing, or the gatekeeper
    Kursawe, K
    Wolf, C
    INFORMATION SOCIETY: EMERGING LANDSCAPES, 2006, 195 : 339 - +
  • [26] Trusted computing and communications
    Wang, Guojun
    Yang, Laurence T.
    Sakurai, Kouichi
    SECURITY AND COMMUNICATION NETWORKS, 2011, 4 (01) : 1 - 2
  • [27] Challenges for Trusted Computing
    Balfe, Shane
    Gallery, Eimear
    Mitchell, Chris J.
    Paterson, Kenneth G.
    IEEE SECURITY & PRIVACY, 2008, 6 (06) : 60 - 66
  • [28] Pairings in Trusted Computing
    Chen, Liqun
    Morrissey, Paul
    Smart, Nigel P.
    PAIRING-BASED CRYPTOGRAPHY - PAIRING 2008, 2008, 5209 : 1 - +
  • [29] TRUSTED COMPUTING UPDATE
    ABRAMS, MD
    JOYCE, MV
    COMPUTERS & SECURITY, 1995, 14 (01) : 57 - 68
  • [30] Mobile Trusted Computing
    Asokan, N.
    Ekberg, Jan-Erik
    Kostiainen, Kari
    Rajan, Anand
    Rozas, Carlos
    Sadeghi, Ahmad-Reza
    Schulz, Steffen
    Wachsmann, Christian
    PROCEEDINGS OF THE IEEE, 2014, 102 (08) : 1189 - 1206