首页 | 本学科首页   官方微博 | 高级检索  
     检索      

可信计算及其进展
引用本文:周明天,谭良.可信计算及其进展[J].电子科技大学学报(社会科学版),2006(Z1).
作者姓名:周明天  谭良
作者单位:电子科技大学计算机科学与工程学院 成都610054(周明天),四川师范大学四川省软件重点实验室 成都610066(谭良)
基金项目:国家863宽带VPN资助项目(863-104-03-01),四川省科技攻关项目(03CG007-007)
摘    要:详细介绍了“可信计算”的发展历程,总结了容错计算(可信系统与网络)、安全探作系统、网络安全等领域的研究对可信计算形成和发展的推动作用;提出了对可信计算的概念、研究对象、目的以及可信计算的体系结构的看法;综述了可信计算中的终端可信、终端可信应用、可信网络连接、可信网络服务、交易可信、可信评测和管理方法等方面的研究内容,并进行了分析和点评,结合已有的研究成果,展望了可信计算未来的研究方向及其面对的挑战.

关 键 词:信息安全  网络安全  可信计算  终端可信

Progress in Trusted Computing
ZHOU Ming-tian TAN Liang.Progress in Trusted Computing[J].Journal of University of Electronic Science and Technology of China(Social Sciences Edition),2006(Z1).
Authors:ZHOU Ming-tian TAN Liang
Institution:ZHOU Ming-tian~1 TAN Liang~2
Abstract:With the increasing application systems on Interact,the security problems grow day by day. However the traditional information security technology can't resolve the current complex security problems.So how to establish a trusted computing environment,which can be fit for the new generation information requirements,has been turned into one of the most important tasks in information technology domain.In this paper, the development history of the trusted computing is first introduced particularly,including Fanlt-Tolerant Computing(Dependable systems and networks),Security Operator System and Network Security,and so on.And then the concept,object,objective,and architecture of trusted computing are studied,The research aspects of trusted computing are addressed such as the trusted end-user,trusted end-user application,trusted network connection,trusted server,trusted transaction,and trusted evaluation and management.Based on the analysis to the shortcomings and problems of these techniques,the trend of the research and the application is discussed.
Keywords:information security  network security  trusted computing  trusted end-user
本文献已被 CNKI 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号