检索规则说明:AND代表“并且”;OR代表“或者”;NOT代表“不包含”;(注意必须大写,运算符两边需空一格)
检 索 范 例 :范例一: (K=图书馆学 OR K=情报学) AND A=范并思 范例二:J=计算机应用与软件 AND (U=C++ OR U=Basic) NOT M=Visual
机构地区:[1]国防科技大学计算机学院,湖南长沙410073
出 处:《计算机技术与发展》2010年第9期1-4,9,共5页Computer Technology and Development
基 金:国家自然科学基金(60903040);国防科技大学预研项目(JC08-06-01)
摘 要:网络中存在的各种隐患已经严重威胁到信息安全,网络攻击越来越趋于隐蔽化,攻击手法趋于复杂化,并且新的攻击手段不断更新,传统网络防护技术尽管也在不断发展,但已显得力不从心。可信计算的思想是从内部入手,从根源上防止各种安全隐患问题的发生。为对可信计算研究现状有一个直观的认识,提出了对"可信计算"体系结构的看法,详细介绍了可信计算终端的概念、特点和原理机制,对可信终端关键部件的结构和特点进行了描述。综述了可信计算在国内外的研究进展情况及目前可信计算的研究内容,并结合已有研究成果,对可信计算未来的研究方向进行了展望。A variety of hidden dangers that exist in the network has been a serious threat to information security,network attacks are increasingly covert,attack methods become more complicated,and the new means of attack constantly updated,traditional network protection technology,although also growing,but it has become inadequate.Trusted computing idea is to start from within,from the root causes of the problem to prevent the occurrence of a variety of security risks.To have a direct-viewing understanding to trusted computing research,present the"trusted computing" architecture views,introduced in detail the trusted computing terminal's concept,characteristics and principles of mechanisms,have carried on the description to the trusted computing terminal key component's structure and characteristics.Summarized the trusted computing in the domestic and foreign research development situation and the present trusted computing research content,and to integrate existing research results,future research on trusted computing direction was predicted.
关 键 词:可信计算 可信模块 可信软件协议栈 可信终端 信任链
分 类 号:TP393.08[自动化与计算机技术—计算机应用技术]
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在链接到云南高校图书馆文献保障联盟下载...
云南高校图书馆联盟文献共享服务平台 版权所有©
您的IP:216.73.216.13