期刊文献+

基于可信计算平台的隐私保护机制

Privacy Protection Scheme Based on Trusted Computing Platform
在线阅读 下载PDF
导出
摘要 针对网络服务环境下有关隐私数据保护的问题,提出了一种基于可信计算平台的保护方案,分别描述了安全策略与隐私数据的分发协议及安全使用协议.该框架基于可信实体身份与访问平台构建,提供了安全的数据使用环境,保证了数据的完整性和安全性. To well secure the privacy data in web services, a protection scheme based on Trusted Computing Platform (TCP) was proposed and the security policies and data usage protocol were described respectively. Analysis shows that owing to constructing the trusted entity identity and the access control platform, the secure data usage platform was provided in the architecture, which ensured the integrity and security of the data.
作者 王玉磊 朱昭
出处 《西南师范大学学报(自然科学版)》 CAS CSCD 北大核心 2009年第4期159-162,共4页 Journal of Southwest China Normal University(Natural Science Edition)
关键词 隐私保护 网络服务 可信计算 privacy protection web services trusted computing
  • 相关文献

参考文献5

  • 1Yee G.A Privacy Controller Approach for Privacy Protection in Web Services[C]//Proceedings of the 2007 ACM Workshop on Secure Web Services.NY:ACM,2007:44-51.
  • 2Trusted Computing Group.TCG Specification Architecture Overview[EB/OL].[2007-11-01].https://www.trustedcomputinggroup.org/groups/TCG_1_0_Architecture_Overview.pdf.
  • 3Trusted Computing Group.TPM Main Part 1 Design Principles[EB/OL].[2007-11-01].https://www.trustedcomputinggroup.org/specs/TPM/tpmwgmainrev62_Part1_Design_Principles.pdf.
  • 4罗凌.XML数字签名在电子公文交换中的应用[J].重庆师范大学学报(自然科学版),2008,25(2):46-49. 被引量:6
  • 5杨照芳,程小平.基于Diff-Hellman的改进Yang-Shieh智能卡认证协议[J].西南师范大学学报(自然科学版),2006,31(6):110-113. 被引量:3

二级参考文献13

  • 1李莉,薛锐,张焕国,冯登国,王丽娜.基于口令认证的密钥交换协议的安全性分析[J].电子学报,2005,33(1):166-170. 被引量:15
  • 2曾莉红.基于Visual.NET技术的网络课件的开发与设计[J].重庆师范大学学报(自然科学版),2005,22(1):27-30. 被引量:2
  • 3奥海炜,伏总强.XML数字签名在电子政务中的应用[J].西部探矿工程,2005,17(10):237-239. 被引量:2
  • 4[1]Yang WH,Shieh SP.Password Authentication Schemes with Smart card[J].Computers & Security,1999,18(8):727-733.
  • 5[2]Fan L,Li JH,Zhu HW.An Enhancement of Timestamp-Based Password Authentication Scheme[J].Computers & Security,2002,21(7):665-667.
  • 6[3]Chan CK,Cheng LM.Cryptanalysis of a Timestamp-Based Password Authentication Scheme[J].Computers & Security,2002,21(1):74-76.
  • 7[4]R Jiang,L Pan,JH Li.Further Analysis of Password Authentication Schemes Based on Authentication Tests[J].Computers & Security,2004,23(4):469-477.
  • 8[5]Thayer FJ,Herzog JC,Guttman JD.Strand spaces:Proving Security Protocols Correct[J].Journal of Computer Security,1999,7(2-3):191-230.
  • 9[6]Guttman JD.Key Compromise,Strand Spaces,and the Authentication Tests[J].Electronic Notes in Theoretical Computer Science,2001,47:1-21.
  • 10Dalvi Dinar,Gray Joe..NET XML高级编程[M].北京:清华大学出版社,2002

共引文献7

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部