首页 | 本学科首页   官方微博 | 高级检索  
     

Shape our Cyberworld: Profile of trusted computing products
基金项目:Acknowledgements: This research is partly supported by the National Basic Research (973) Program (No. 2006CB303000).
摘    要:Market watchers are splashing criticisms and suspicions over the trusted computing, declaring that it will be many years before large numbers of companies and individuals benefit from this technology. This paper investigates a majority of TCG (Trusted Computing Group) members, classifies their products as TPM chips, TCG enabled hardware and software. The data are collected from both literature and websites. It indicates that the trusted computing technology in China is considerable on chips and hardware. As for TCG enabled software, there still have many obstacles for Chinese to combat.

关 键 词:计算机组  计算机网络  虚拟世界  安全

Shape our Cyberworld: Profile of trusted computing products
Authors:LIU Hui LIN Xin WEI Jun-yin
Affiliation:[1]School of Computer Science and Technology, Donghua University, Shanghai 201620, China [2]School of lnformation Science and Technology, Donghua University, Shanghai 201620, China
Abstract:trusted computing TPM, TCG security privacy
Keywords:trusted computing  TPM  TCG  security  privacy
本文献已被 维普 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号