The trust measurement scheme in trusted computing

被引:0
|
作者
Zhang, Li-Qiang [1 ,2 ]
Zhang, Huan-Guo [2 ,3 ]
Zhang, Fan [4 ]
机构
[1] State Key Lab of Software Engineering, Wuhan University, Wuhan 430072, China
[2] Computer School, Wuhan University, Wuhan 430072, China
[3] Key Lab of Aerospace Information Security and Trusted Computing, Wuhan University, Wuhan 430072, China
[4] College of Communication Engineering, Hangzhou Dianzi University, Hangzhou 310018, China
关键词
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
页码:586 / 591
相关论文
共 50 条
  • [1] Enforcing trust in pervasive computing with trusted computing technology
    Li, Shiqun
    Balfe, Shane
    Zhou, Jianying
    Chen, Kefei
    CRITICAL INFORMATION INFRASTRUCTURES SECURITY, 2006, 4347 : 195 - +
  • [2] A Secure Trust Model Based on Trusted Computing
    Yin Zhixi
    2009 INTERNATIONAL CONFERENCE ON E-BUSINESS AND INFORMATION SYSTEM SECURITY, VOLS 1 AND 2, 2009, : 170 - 176
  • [3] A Trust Model for Heterogeneous Trusted Computing Architectures
    Zhu, Lu
    Yu, Sheng
    Zhang, Xing
    NSWCTC 2009: INTERNATIONAL CONFERENCE ON NETWORKS SECURITY, WIRELESS COMMUNICATIONS AND TRUSTED COMPUTING, VOL 2, PROCEEDINGS, 2009, : 539 - +
  • [4] A Trusted Measurement Scheme Suitable for the Clients in the Trusted Network
    Gong Bei
    Zhang Jianbiao
    Ye Xiaolie
    Shen Changxiang
    CHINA COMMUNICATIONS, 2014, 11 (04) : 143 - 153
  • [5] Integrity Measurement based on Trusted Computing
    Li, Yiming
    Ba, Haihe
    Ren, Jiangchun
    PROCEEDINGS OF THE 5TH INTERNATIONAL CONFERENCE ON INFORMATION ENGINEERING FOR MECHANICS AND MATERIALS, 2015, 21 : 956 - 959
  • [6] Security analysis on trust chain of trusted computing platform
    Xu M.-D.
    Zhang H.-G.
    Zhao H.
    Li J.-L.
    Yan F.
    Jisuanji Xuebao/Chinese Journal of Computers, 2010, 33 (07): : 1165 - 1176
  • [7] A scheme based on trusted computing for terminal security
    Zhang, Jun
    Liu, Wei-peng
    Zhou, Zheng
    Li, Jian
    PROCEEDINGS OF THE FIRST INTERNATIONAL SYMPOSIUM ON DATA, PRIVACY, AND E-COMMERCE, 2007, : 218 - +
  • [8] Digital Trust - Trusted Computing and Beyond A Position Paper
    Akram, Raja Naeem
    Ko, Ryan K. L.
    2014 IEEE 13TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM), 2014, : 884 - 892
  • [9] Research on Trust Model Based on Behavior and Trusted Computing
    Gu Yue-sheng
    Chen Jun
    Wang Yan-rong
    PROGRESS IN MEASUREMENT AND TESTING, PTS 1 AND 2, 2010, 108-111 : 1259 - 1263