首页 | 本学科首页   官方微博 | 高级检索  
     

基于可信平台的保护计算
引用本文:刘义铭,邱敏.基于可信平台的保护计算[J].信息安全与通信保密,2008(7):56-58.
作者姓名:刘义铭  邱敏
作者单位:中国电子科技集团公司第三十研究所,四川成都610041
摘    要:随着计算机及网络技术的日趋成熟,全面解决计算机安全问题的要求就显得十分迫切。本文首先分析了已有的可信计算在解决计算机安全问题方面提供的一些手段,并指出其中存在的不足。之后提出保护计算的概念,具体阐述其机制和原理,最后论述保护计算作为一种对于可信计算的补充和完善对于解决现有计算机安全问题的所能提供的更优越的方案。

关 键 词:可信计算  保护计算  计算机安全

Protected Computing Based on TPM
LIU Yi-ming,QIU Min.Protected Computing Based on TPM[J].China Information Security,2008(7):56-58.
Authors:LIU Yi-ming  QIU Min
Affiliation:(No.30 Institute of CETC, Chengdu Sichuan 6 10041, Chengdu Sichuan 610041, China)
Abstract:With the gradual maturing of computer and network technology, A complete solution for computer has become an urgent need. In the paper, some measures provided by the trusted computing to solve the computer security problems are first analyzed, the shortages of this scheme pointed out, the concept of protected computing is advanced, its mechanism and principle described in detail. Finally, the protected computing is discussed, which is regarded as the complement and improvement of trusted computing for a better solution of the existing computer security problem.
Keywords:the trusted computin  protected computing  computer security
本文献已被 维普 万方数据 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号