TRUSTED COMPUTING UPDATE

被引:8
|
作者
ABRAMS, MD
JOYCE, MV
机构
[1] The MITRE Corporation, McLean, VA 22102
关键词
COMPUTER ARCHITECTURE; SECURITY; DISTRIBUTED SYSTEMS; ACCESS CONTROL; POLICY; TRUSTED COMPUTING BASE; APPLICATIONS; SEPARATION;
D O I
10.1016/0167-4048(95)97026-7
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This is the second paper of a series of three related papers that examine contemporary information technology concepts. The first paper examined how the security community developed the accepted concepts and criteria, looked at changes currently ongoing, and provided insight into the driving forces and probable directions. This paper presents contemporary thinking about object management and summarizes vertical and horizontal extensions to the Trusted Computing Base (TCB) concept.
引用
收藏
页码:57 / 68
页数:12
相关论文
共 50 条
  • [41] Trusted computing for automotive systems
    Bogdanov, A.
    Eisenbarth, T.
    Wolf, M.
    Wollinger, T.
    AUTOMOTIVE SECURITY, 2007, 2016 : 227 - 237
  • [42] Security Architecture of Trusted Virtual Machine Monitor for Trusted Computing
    HUANG Qiang1
    2. Naval Institute of Computing Technology
    3. College of Information Technical Science
    WuhanUniversityJournalofNaturalSciences, 2007, (01) : 13 - 16
  • [43] Design and Implementation of Mobile Trusted Module for Trusted Mobile Computing
    Kim, Mooseop
    Ju, Hongil
    Kim, Youngsae
    Park, Jiman
    Park, Youngsoo
    IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 2010, 56 (01) : 134 - 140
  • [44] Building trusted sub-domain for the Grid with trusted computing
    Zhan, Jing
    Zhang, Huanguo
    Yan, Fei
    INFORMATION SECURITY AND CRYPTOLOGY, 2008, 4990 : 463 - +
  • [45] TRUSTED ILLIAC:: A configurable hardware framework for a trusted computing base
    Iyer, Ravishankar K.
    HASE 2007: 10TH IEEE HIGH ASSURANCE SYSTEMS ENGINEERING SYMPOSIUM, PROCEEDINGS, 2007, : 3 - 3
  • [46] Trusted code remote execution through trusted computing and virtualization
    Zhang, Liqiang
    Chen, Lu
    Zhang, Huanguo
    Yan, Fei
    SNPD 2007: EIGHTH ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, ARTIFICIAL INTELLIGENCE, NETWORKING, AND PARALLEL/DISTRIBUTED COMPUTING, VOL 1, PROCEEDINGS, 2007, : 39 - +
  • [47] Design and Implementation of Mobile Trusted Module for Trusted Mobile Computing
    Kim, Mooseop
    Kim, Youngsae
    Ju, Hongil
    Park, Youngsoo
    2010 DIGEST OF TECHNICAL PAPERS INTERNATIONAL CONFERENCE ON CONSUMER ELECTRONICS ICCE, 2010,
  • [48] Enforcing trust in pervasive computing with trusted computing technology
    Li, Shiqun
    Balfe, Shane
    Zhou, Jianying
    Chen, Kefei
    CRITICAL INFORMATION INFRASTRUCTURES SECURITY, 2006, 4347 : 195 - +
  • [49] The Trusted Computing exemplary with Astonishing Security for Cloud Computing
    Devi, Ramya M.
    Balamurugan, P. S.
    Thanushkodi, K.
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2011, 11 (01): : 206 - 209
  • [50] The Trusted Execution Module: Commodity general-purpose trusted computing
    Costan, Victor
    Sarmenta, Luis F. G.
    van Dijk, Marten
    Devadas, Srinivas
    SMART CARD RESEARCH AND ADVANCED APPLICATIONS, PROCEEDINGS, 2008, 5189 : 133 - 148