首页 | 本学科首页   官方微博 | 高级检索  
     

可信计算之信任链技术研究
引用本文:王江少,余综,李光.可信计算之信任链技术研究[J].计算机工程与设计,2008,29(9):2195-2198.
作者姓名:王江少  余综  李光
作者单位:华北计算技术研究所,北京,100083
摘    要:可信计算近年发展迅速,被认为是最有可能从根本上解决计算机系统安全问题的一种方案,不同于传统信息安全解决办法,它以新的思路即主动防御来解决计算机和网络系统的信息安全问题.信任根和信任链是可信计算的根本组成部分.介绍了可信计算及信任链的相关知识,介绍了信任根,可信认证机制.最后详细给出了基于PCI扩展ROM的可信计算之信任链部分链实现的可行方案.

关 键 词:可信计算  信任根  信任链  可信认证  PCI扩展ROM
文章编号:1000-7024(2008)09-2195-04
修稿时间:2007年6月7日

Study of trusted chain technology of computing trusted
WANG Jiang-shao,YU Zong,LI Guang.Study of trusted chain technology of computing trusted[J].Computer Engineering and Design,2008,29(9):2195-2198.
Authors:WANG Jiang-shao  YU Zong  LI Guang
Affiliation:WANG Jiang-shao,YU Zong,LI Guang(North China Institute of Computing Technology,Beijing 100083,China)
Abstract:Trusted computing,which has been considered as the best method in resolving the security of computer system,has been developing very fast in recent years.It is a new measure that makes use of active defending to resolve security problem of computer and network system.Root of the trust and the system of trusted chain are the most important components of trusted computing.The trusted computing and the trusted chain system,as well as the device of root of trust,and the authentication mechanism of trusted compu...
Keywords:trusted computing  root of trust  trusted chain  trust authentication  PCI extended ROM  
本文献已被 CNKI 维普 万方数据 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号