检索规则说明:AND代表“并且”;OR代表“或者”;NOT代表“不包含”;(注意必须大写,运算符两边需空一格)
检 索 范 例 :范例一: (K=图书馆学 OR K=情报学) AND A=范并思 范例二:J=计算机应用与软件 AND (U=C++ OR U=Basic) NOT M=Visual
作 者:LI Shiqun Shane Balfe ZHOU Jianying CHEN Kefei
机构地区:[1]School of Electronic Information and Electeical Engineering, Shanghai Jiao Tong University, Shanghai 200240, China [2]Royal Holloway, University of London, Egham, Surrey, TW20 0EX, United Kingdom [3]Institute for Infocomm Research, 21 Heng Mui Keng Terrace, Singapore 119613, Singapore
出 处:《Wuhan University Journal of Natural Sciences》2006年第6期1477-1480,共4页武汉大学学报(自然科学英文版)
基 金:Supported by the National Natural Science Foun-dation of China (60573030 ,60303026 ,60473020) ;the Institutefor Infocomm Research 21 Heng Mui Keng Terrace ,Singapore .
摘 要:Pervasive computing environment is a distributed and mobile space. Trust relationship must be established and ensured between devices and the systems in the pervasive computing environment. The trusted computing (TC) technology introduced by trusted computing group is a distributed-system-wide approach to the provisions of integrity protection of resources. The TC's notion of trust and security can be described as conformed system behaviors of a platform environment such that the conformation can be attested to a remote challenger. In this paper the trust requirements in a pervasive/ubiquitous environment are analyzed. Then security schemes for the pervasive computing are proposed using primitives offered by TC technology.Pervasive computing environment is a distributed and mobile space. Trust relationship must be established and ensured between devices and the systems in the pervasive computing environment. The trusted computing (TC) technology introduced by trusted computing group is a distributed-system-wide approach to the provisions of integrity protection of resources. The TC's notion of trust and security can be described as conformed system behaviors of a platform environment such that the conformation can be attested to a remote challenger. In this paper the trust requirements in a pervasive/ubiquitous environment are analyzed. Then security schemes for the pervasive computing are proposed using primitives offered by TC technology.
关 键 词:trusted computing pervasive computing pervasive computing security
分 类 号:TP305[自动化与计算机技术—计算机系统结构]
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在链接到云南高校图书馆文献保障联盟下载...
云南高校图书馆联盟文献共享服务平台 版权所有©
您的IP:3.149.255.189