首页 | 本学科首页   官方微博 | 高级检索  
     检索      

The Mechanism about Key and Credential on Trusted Computing Platform and the Application Study
作者姓名:SHEN  Zhidong  ZHANG  Huanguo  ZHANG  Miao  YAN  Fei  ZHANG  Liqiang
作者单位:School of Computer, Wuhan University, Wuhan 430072, Hubei, China
摘    要:0 IntroductionPeople need a secure and dependable computing environ-ment1]. The cryptology is known as the core of com-puter security2]. The application of cryptologyis mainly ful-filled by key management and credential mechanism.In thispaper , we should study the key management and credentialmechanismbased ontrusted computing platform,and give theactual application of these security mechanisms for buildingtrusted computing environment .1 OverviewTrusted Computing1 .1 The Original of Trus…

关 键 词:信任计算  TPM  秘钥管理  凭证
文章编号:1007-1202(2006)06-1641-04
收稿时间:2006-04-28

The mechanism about key and credential on trusted computing platform and the application study
SHEN Zhidong ZHANG Huanguo ZHANG Miao YAN Fei ZHANG Liqiang.The Mechanism about Key and Credential on Trusted Computing Platform and the Application Study[J].Wuhan University Journal of Natural Sciences,2006,11(6):1641-1644.
Authors:Zhen Zhidong  Zhang Huanguo  Zhang Miao  Yan Fei  Zhang Liqiang
Institution:(1) School of Computer, Wuhan University, 430072 Wuhan, Hubei, China
Abstract:Trusted Computing technology is quickly developing in recent years. This technology manages to improve the computer security and archive a trusted computing environment. The core of trusted computing technology is cryptology. In this paper, we analyze the key and credential mechanism which is two basic aspects in the cryptology application of trusted computing. We give an example application to illustrate that the TPM enabled key and credential mechanism can improve the security of computer system.
Keywords:trusted computing  trusted platform module (TPM)  key management  credential
本文献已被 CNKI 维普 万方数据 SpringerLink 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号