期刊文献+

The Mechanism about Key and Credential on Trusted Computing Platform and the Application Study 被引量:2

The Mechanism about Key and Credential on Trusted Computing Platform and the Application Study
下载PDF
导出
摘要 Trusted Computing technology is quickly developing in recent years. This technology manages to improve the computer security and archive a trusted computing environment. The core of trusted computing technology is cryptology. In this paper, we analyze the key and credential mechanism which is two basic aspects in the cryptology application of trusted computing. We give an example application to illustrate that the TPM enabled key and credential mechanism can improve the security of computer system. Trusted Computing technology is quickly developing in recent years. This technology manages to improve the computer security and archive a trusted computing environment. The core of trusted computing technology is cryptology. In this paper, we analyze the key and credential mechanism which is two basic aspects in the cryptology application of trusted computing. We give an example application to illustrate that the TPM enabled key and credential mechanism can improve the security of computer system.
机构地区 School of Computer
出处 《Wuhan University Journal of Natural Sciences》 CAS 2006年第6期1641-1644,共4页 武汉大学学报(自然科学英文版)
基金 Supported by the National Natural Science Foun-dation of China (60373087 ,60473023 ,90104005) HP Laborato-ry of China
关键词 trusted computing trusted platform module (TPM) key management CREDENTIAL trusted computing trusted platform module (TPM) key management credential
  • 相关文献

参考文献10

  • 1ISO,IEC.Information Technology-Open Systems Intercon- nection-Evaluation Criteria for Information Technology[].Standard ISO/IEC.1999
  • 2Trusted Computing Group.TPM Main Part2TPMStruc- tures , Specification Version1.2 [ R][]..2006
  • 3Mao W.Daonity Specification Part I Design [ EB/OL][].https://forge gridforumorg/ project/tc- rg.2006
  • 4Reid J,Nieto J M G,Dawson E,et al.Privacy and Trusted Computing[].Proceedings of the th International Workshop on Database and Expert Systems Applications(DEXA’).2003
  • 5Algirdas Avizienis,Jean-laude Laprie,Brian Randell,Carl Landwehr.Basic Concepts and Taxonomy of Dependable and Secure Computing[].IEEE Transactions on Dependable and Secure Computing.2004
  • 6Schechter S. E,Greenstadt R. A,and Smith M. D.Trusted Computing, Peer-To-Peer Distribution, and the Economics of Pirated Entertainment[].Proceedings of the Second Annual Workshop on Economics and Information Security.2003
  • 7Trusted Computing Platform Alliance (TCPA) Main Specification Version 1. 1b . 2003
  • 8TPM Main Part 1 Design Principles, Specification Version 1.2 . 2006
  • 9Foster,I,Kesselman,C,Tsudik,G. A Security Architecture for Computational Grids [C]//5th ACM Conference on Computer and Communications Security . 1998
  • 10Lorch,M,Basney,J,Kafura,D. A Hardware-secured Credential Repository for Grid PKIs [C]//Proc of 4th IEEE/ACM International Symposium on Cluster Computing and the Grid . 2004

同被引文献16

引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部