首页 | 本学科首页   官方微博 | 高级检索  
     

基于平台可信链的可信边界扩展模型
引用本文:刘皖,谭明,郑军.基于平台可信链的可信边界扩展模型[J].计算机工程,2008,34(6):176-178.
作者姓名:刘皖  谭明  郑军
作者单位:1. 解放军信息工程大学电子技术学院,郑州,450004
2. 总参谋部第五十一研究所,北京,100072
3. 总参谋部第五十七研究所,成都,610000
摘    要:以可信终端、可信连接、可信网络为代表的可信计算技术立足于终端和网络的自身免疫,开辟了以信任促安全的新思路,成为众多安全公司解决安全问题的热选技术。该文以可信终端技术中的可信链模型为对象,系统研究了可信链的概念模型,给出建模过程、模型的原型实现并指出该模型较之传统安全模型的优点。

关 键 词:可信计算  平台可信链  可信边界扩展  概念模型
文章编号:1000-3428(2008)06-0176-03
收稿时间:2007-03-30
修稿时间:2007年3月30日

Trusted Boundary Extension Model Based on Trusted Chain on Platform
LIU Wan,TAN Ming,ZHENG Jun.Trusted Boundary Extension Model Based on Trusted Chain on Platform[J].Computer Engineering,2008,34(6):176-178.
Authors:LIU Wan  TAN Ming  ZHENG Jun
Affiliation:LIU Wan1, TAN Ming2, ZHENG Jun3
(1. Institute of Electronic Technology, PLA Information Engineering University, Zhengzhou 450004;2. The Fifty-first Graduate School of General Staff, Beijing 100072; 3. The Fifty-seventh Graduate School of General Staff, Chengdu 610000)
Abstract:Trusted computing technologies typically used in trusted terminal, trusted connect, trusted network, focusing on the self immunity of terminal and network, put forwards the thinking which accomplishes security in the way of building trust. It becomes the first choice of many information security companies. This paper chooses the trusted-chain model of trusted terminal technology as the research object, studies the conception model of trusted-chain, gives the modeling process, the realization of the model’s antetype, and points out the advantages of the model compared with the conditional information security model.
Keywords:trusted computing  trusted chain on platform  trusted boundary extension  conception model
本文献已被 CNKI 维普 万方数据 等数据库收录!
点击此处可从《计算机工程》浏览原始摘要信息
点击此处可从《计算机工程》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号