TRUSTED COMPUTING AND INFORMATION SECURITY

被引:0
|
作者
Zhang Huanguo [1 ,2 ,3 ]
Mu Yi [4 ]
机构
[1] Xidian Univ, Xian, Peoples R China
[2] Wuhan Univ, Wuhan, Peoples R China
[3] Xidian Univ, Xian, Peoples R China
[4] Univ Wollongong, Wollongong, NSW 2522, Australia
关键词
D O I
暂无
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
引用
收藏
页码:IX / X
页数:2
相关论文
共 50 条
  • [1] TRUSTED COMPUTING AND INFORMATION SECURITY
    张焕国
    MU Yi
    [J]. China Communications, 2013, 10 (11) : 11 - 12
  • [2] An information flow security model to trusted computing system
    Hu Jun
    Shen Changxiang
    [J]. PROCEEDINGS OF THE FIRST INTERNATIONAL SYMPOSIUM ON DATA, PRIVACY, AND E-COMMERCE, 2007, : 310 - +
  • [3] From trusted information security controls to a trusted information security environment
    Von Solms, R
    Van De Haar, H
    [J]. INFORMATION SECURITY FOR GLOBAL INFORMATION INFRASTRUCTURES, 2000, 47 : 29 - 36
  • [4] Mobile Security and Trusted Computing
    Mitchell, Chris
    [J]. IT-INFORMATION TECHNOLOGY, 2006, 48 (06): : 321 - 326
  • [5] Trusted Computing: Security and Applications
    Gallery, Eimear
    Mitchell, Chris J.
    [J]. CRYPTOLOGIA, 2009, 33 (03) : 217 - 245
  • [6] Compiling Information-Flow Security to Minimal Trusted Computing Bases
    Fournet, Cedric
    Planul, Jeremy
    [J]. PROGRAMMING LANGUAGES AND SYSTEMS, 2011, 6602 : 216 - 235
  • [7] An Efficient Security Architecture for Trusted Computing
    Yin Zhixi
    [J]. 2009 2ND IEEE INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY, VOL 4, 2009, : 599 - 601
  • [8] OSLO: Improving the security of trusted computing
    Kauer, Bernhard
    [J]. USENIX ASSOCIATION PROCEEDINGS OF THE 16TH USENIX SECURITY SYMPOSIUM, 2007, : 229 - 237
  • [9] A security model to protect sensitive information flows based on trusted computing technologies
    Wang, Shi-Hua
    Li, Xiao-Yong
    [J]. PROCEEDINGS OF 2008 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-7, 2008, : 3646 - +
  • [10] Security Architecture of Trusted Virtual Machine Monitor for Trusted Computing
    HUANG Qiang1
    2. Naval Institute of Computing Technology
    3. College of Information Technical Science
    [J]. Wuhan University Journal of Natural Sciences, 2007, (01) : 13 - 16