TRUSTED COMPUTING UPDATE

被引:8
|
作者
ABRAMS, MD
JOYCE, MV
机构
[1] The MITRE Corporation, McLean, VA 22102
关键词
COMPUTER ARCHITECTURE; SECURITY; DISTRIBUTED SYSTEMS; ACCESS CONTROL; POLICY; TRUSTED COMPUTING BASE; APPLICATIONS; SEPARATION;
D O I
10.1016/0167-4048(95)97026-7
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This is the second paper of a series of three related papers that examine contemporary information technology concepts. The first paper examined how the security community developed the accepted concepts and criteria, looked at changes currently ongoing, and provided insight into the driving forces and probable directions. This paper presents contemporary thinking about object management and summarizes vertical and horizontal extensions to the Trusted Computing Base (TCB) concept.
引用
下载
收藏
页码:57 / 68
页数:12
相关论文
共 50 条
  • [1] Challenges for Trusted Computing
    Sadeghi, Ahmad-Reza
    CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2006, PROCEEDINGS, 2006, 4249 : 414 - 414
  • [2] Privacy and trusted computing
    Reid, J
    Nieto, JMG
    Dawson, E
    Okamoto, E
    14TH INTERNATIONAL WORKSHOP ON DATABASE AND EXPERT SYSTEMS APPLICATIONS, PROCEEDINGS, 2003, : 383 - 388
  • [3] Pervasive Trusted Computing
    Balfe, Shane
    Li, Shiqun
    Zhou, Jianying
    SECOND INTERNATIONAL WORKSHOP ON SECURITY, PRIVACY AND TRUST IN PERVASIVE AND UBIQUITOUS COMPUTING, PROCEEDINGS, 2006, : 88 - +
  • [4] Trusted computing in context
    Schneider, Fred B.
    IEEE SECURITY & PRIVACY, 2007, 5 (02) : 4 - 5
  • [5] Trusted computing for infrastructure
    1600, Telefonaktiebolaget L.M. Ericsson (91):
  • [6] Modeling Trusted Computing
    CHEN Shuyi
    Wuhan University Journal of Natural Sciences, 2006, (06) : 1507 - 1510
  • [7] Trusted computing, or the gatekeeper
    Kursawe, K
    Wolf, C
    INFORMATION SOCIETY: EMERGING LANDSCAPES, 2006, 195 : 339 - +
  • [8] Trusted computing and communications
    Wang, Guojun
    Yang, Laurence T.
    Sakurai, Kouichi
    SECURITY AND COMMUNICATION NETWORKS, 2011, 4 (01) : 1 - 2
  • [9] Challenges for Trusted Computing
    Balfe, Shane
    Gallery, Eimear
    Mitchell, Chris J.
    Paterson, Kenneth G.
    IEEE SECURITY & PRIVACY, 2008, 6 (06) : 60 - 66
  • [10] Pairings in Trusted Computing
    Chen, Liqun
    Morrissey, Paul
    Smart, Nigel P.
    PAIRING-BASED CRYPTOGRAPHY - PAIRING 2008, 2008, 5209 : 1 - +