首页 | 本学科首页   官方微博 | 高级检索  
     检索      

Development of Trusted Computing Research
作者姓名:ZHANG  Huanguo  LUO  Jie  JIN  Gang  ZHU  Zhiqiang  YU  Fajiang  YAN  Fei
作者单位:[1]School of Computer, Wuhan University, Wuhan 430072, Hubei, China [2]State Key Laboratory of Software Engineering, Wuhan University, Wuhan 430072, Hubei, China
基金项目:Supported by the National Natural Science Foundation of China (90104005, 60373087, 60473023) and Network and Information Security Key Laboratory Program of Ministry of Education of China
摘    要:0 IntroductionWiththe development of informationtechnology,infor-mation market gives all-ti me thriving appearance;theother side,the attack events increased, which have affectednational security and social stabilization. Under the situation,trusted computing (TC) is required.Current trusted computing is to adding the concept oftrust to information society. Through the current technolo-gies ,the trust society would be established and informationsecurity would bei mproved.In technical fields ,…

关 键 词:计算机  信息安全  信任计算  软件系统
文章编号:1007-1202(2006)06-1407-07
收稿时间:2006-03-30

Development of trusted computing research
ZHANG Huanguo LUO Jie JIN Gang ZHU Zhiqiang YU Fajiang YAN Fei.Development of Trusted Computing Research[J].Wuhan University Journal of Natural Sciences,2006,11(6):1407-1413.
Authors:Zhang Huanguo  Luo Jie  Jin Gang  Zhu Zhiqiang  Yu Fajiang  Yan Fei
Institution:(1) School of Computer, Wuhan University, 430072 Wuhan, Hubei, China;(2) State Key Laboratory of Software Engineering, Wuhan University, 430072 Wuhan, Hubei, China
Abstract:Trusted computing is the new trend of information security today. This paper surveys the theory and technology of trusted computing. The development history of trusted computing, and the development of trusted computing in China are introduced in this paper, and then it analyzes some problems of trusted computing at present which are delay in theory research, some key technologies to be developed and lack of trusted software system. Some fields are worthy to be explored on are pointed out including key technology, basic theory and application in trusted computing.
Keywords:computer  trusted computing  secure computer  information security
本文献已被 CNKI 维普 SpringerLink 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号