Trust Based Pervasive Computing  被引量:2

Trust Based Pervasive Computing

在线阅读下载全文

作  者:LI Shiqun Shane Balfe ZHOU Jianying CHEN Kefei 

机构地区:[1]School of Electronic Information and Electeical Engineering, Shanghai Jiao Tong University, Shanghai 200240, China [2]Royal Holloway, University of London, Egham, Surrey, TW20 0EX, United Kingdom [3]Institute for Infocomm Research, 21 Heng Mui Keng Terrace, Singapore 119613, Singapore

出  处:《Wuhan University Journal of Natural Sciences》2006年第6期1477-1480,共4页武汉大学学报(自然科学英文版)

基  金:Supported by the National Natural Science Foun-dation of China (60573030 ,60303026 ,60473020) ;the Institutefor Infocomm Research 21 Heng Mui Keng Terrace ,Singapore .

摘  要:Pervasive computing environment is a distributed and mobile space. Trust relationship must be established and ensured between devices and the systems in the pervasive computing environment. The trusted computing (TC) technology introduced by trusted computing group is a distributed-system-wide approach to the provisions of integrity protection of resources. The TC's notion of trust and security can be described as conformed system behaviors of a platform environment such that the conformation can be attested to a remote challenger. In this paper the trust requirements in a pervasive/ubiquitous environment are analyzed. Then security schemes for the pervasive computing are proposed using primitives offered by TC technology.Pervasive computing environment is a distributed and mobile space. Trust relationship must be established and ensured between devices and the systems in the pervasive computing environment. The trusted computing (TC) technology introduced by trusted computing group is a distributed-system-wide approach to the provisions of integrity protection of resources. The TC's notion of trust and security can be described as conformed system behaviors of a platform environment such that the conformation can be attested to a remote challenger. In this paper the trust requirements in a pervasive/ubiquitous environment are analyzed. Then security schemes for the pervasive computing are proposed using primitives offered by TC technology.

关 键 词:trusted computing pervasive computing pervasive computing security 

分 类 号:TP305[自动化与计算机技术—计算机系统结构]

 

参考文献:

正在载入数据...

 

二级参考文献:

正在载入数据...

 

耦合文献:

正在载入数据...

 

引证文献:

正在载入数据...

 

二级引证文献:

正在载入数据...

 

同被引文献:

正在载入数据...

 

相关期刊文献:

正在载入数据...

相关的主题
相关的作者对象
相关的机构对象