可信网络连接研究 |
| |
引用本文: | 张焕国,陈璐,张立强.可信网络连接研究[J].计算机学报,2010,33(4). |
| |
作者姓名: | 张焕国 陈璐 张立强 |
| |
作者单位: | 1. 武汉大学计算机学院,武汉,430072;空天信息安全与可信计算教育部重点实验室,武汉,430072 2. 武汉大学计算机学院,武汉,430072 3. 武汉大学软件工程国家重点实验室,武汉,430072 |
| |
基金项目: | 国家“八六三”高技术研究发展计划项目基金(2006AA01Z442,2007AA01Z411);;国家自然科学基金(60673071,60970115)资助~~ |
| |
摘 要: | 文中详细地介绍了可信网络连接的发展历程、体系结构、消息流程、相关规范,对TCG的可信网络连接架构的优点与局限性进行了分析.针对如何将可信计算机制拓展到网络,使得网络成为可信的计算环境这一问题进行了分析论述,并对可信网络连接技术未来的发展趋势进行了展望.
|
关 键 词: | 可信计算 可信网络连接 可信网络 网络安全 信息安全 |
Research on Trusted Network Connection |
| |
Affiliation: | School of Computer/a>;Wuhan University/a>;Wuhan 430072;Key Laboratory of Aerospace Information Security and Trusted Computing of Ministry of Education/a>;Wuhan 430072;State Key Laboratory of Software Engineering/a>;Wuhan 430072 |
| |
Abstract: | This paper introduces the development history,architecture,information flow and related specification of Trusted Network Connection in details.Analyses are given on Trusted Network Connection architecture;merits and restriction are pointed out.Focusing on how to extend the Trusted Computing mechanism into network and make network to be a trusted computing environment,related research work are analyzed and summarized.Some future research trends and development on Trusted Network Connection are advised. |
| |
Keywords: | trusted computing trusted network connection trusted network network security information security |
本文献已被 CNKI 万方数据 等数据库收录! |
|