Shape our Cyberworld: Profile of trusted computing products |
| |
基金项目: | Acknowledgements: This research is partly supported by the National Basic Research (973) Program (No. 2006CB303000). |
| |
摘 要: | Market watchers are splashing criticisms and suspicions over the trusted computing, declaring that it will be many years before large numbers of companies and individuals benefit from this technology. This paper investigates a majority of TCG (Trusted Computing Group) members, classifies their products as TPM chips, TCG enabled hardware and software. The data are collected from both literature and websites. It indicates that the trusted computing technology in China is considerable on chips and hardware. As for TCG enabled software, there still have many obstacles for Chinese to combat.
|
关 键 词: | 计算机组 计算机网络 虚拟世界 安全 |
Shape our Cyberworld: Profile of trusted computing products |
| |
Authors: | LIU Hui LIN Xin WEI Jun-yin |
| |
Affiliation: | [1]School of Computer Science and Technology, Donghua University, Shanghai 201620, China [2]School of lnformation Science and Technology, Donghua University, Shanghai 201620, China |
| |
Abstract: | trusted computing TPM, TCG security privacy |
| |
Keywords: | trusted computing TPM TCG security privacy |
本文献已被 维普 等数据库收录! |