期刊文献+
共找到1,393篇文章
< 1 2 70 >
每页显示 20 50 100
TPTVer: A Trusted Third Party Based Trusted Verifier for Multi-Layered Outsourced Big Data System in Cloud Environment 被引量:3
1
作者 Jing Zhan Xudong Fan +2 位作者 Lei Cai Yaqi Gao Junxi Zhuang 《China Communications》 SCIE CSCD 2018年第2期122-137,共16页
Cloud computing is very useful for big data owner who doesn't want to manage IT infrastructure and big data technique details. However, it is hard for big data owner to trust multi-layer outsourced big data system... Cloud computing is very useful for big data owner who doesn't want to manage IT infrastructure and big data technique details. However, it is hard for big data owner to trust multi-layer outsourced big data system in cloud environment and to verify which outsourced service leads to the problem. Similarly, the cloud service provider cannot simply trust the data computation applications. At last,the verification data itself may also leak the sensitive information from the cloud service provider and data owner. We propose a new three-level definition of the verification, threat model, corresponding trusted policies based on different roles for outsourced big data system in cloud. We also provide two policy enforcement methods for building trusted data computation environment by measuring both the Map Reduce application and its behaviors based on trusted computing and aspect-oriented programming. To prevent sensitive information leakage from verification process,we provide a privacy-preserved verification method. Finally, we implement the TPTVer, a Trusted third Party based Trusted Verifier as a proof of concept system. Our evaluation and analysis show that TPTVer can provide trusted verification for multi-layered outsourced big data system in the cloud with low overhead. 展开更多
关键词 big data security outsourced ser-vice security MapReduce behavior trustedverification trusted third party
在线阅读 下载PDF
Study on the Factors Driving the Loyalty of the Customers of a Third Party Mobile Payment Platform
2
作者 Zhengjie ZHANG Xue DONG +1 位作者 Fang ZOU Zhiguang GUO 《International Journal of Technology Management》 2015年第11期16-19,共4页
. In this paper, the main driving factors affecting the customer loyalty of a third party mobile payment service were chosen by combining with the actual situation of the third party mobile payment service and custome... . In this paper, the main driving factors affecting the customer loyalty of a third party mobile payment service were chosen by combining with the actual situation of the third party mobile payment service and customer spending habits in China. The assumed relations between all affecting factors and the customer loyalty of a third party mobile payment platform were proposed, and a model for studying customer loyalty was established and also a conclusion was made through the questionnaire survey analysis data. Finally, suggestions on improving the loyalty of the customers of a third party mobile payment platform are presented. 展开更多
关键词 A third party Mobile Payment Customer Loyalty Perceived Value Trust in Relationship
在线阅读 下载PDF
Trusted identification and trusted product data: GS1’s vision for collaborative global standards
3
作者 Renaud de Barbuat 《China Standardization》 2025年第5期42-42,共1页
GS1 is an international standards organization,which focuses on product identification and product data,helping businesses and governments to improve commerce and supply chain.Why trusted data is essential to high-qua... GS1 is an international standards organization,which focuses on product identification and product data,helping businesses and governments to improve commerce and supply chain.Why trusted data is essential to high-quality development?More than 50 years ago,GS1 was initiated with the bar code,a profound transformation of the way we work and live.From then on,a simple scan connected a physical product to its digital identity.It transformed commerce,improving supply chains and enabling safer healthcare.Collaboration between industry and governments,and a strong partnership with ISO and IEC laid the foundations for the global adoption of a common product identification over the past 50 years and all around the world. 展开更多
关键词 improve commerce supply chainwhy trusted product data supply chains product identification bar codea trusted data trusted identification physical product
原文传递
Cherishing the Value of Trusted Research in a Complicated World with AI
4
作者 SONG Jianlan 《Bulletin of the Chinese Academy of Sciences》 2025年第2期70-79,共10页
In an era where artificial intelligence(AI)is permeating many aspects of scientific research activity,what science and technology(S&T)journals can do to uphold research integrity and secure scholarly quality?What ... In an era where artificial intelligence(AI)is permeating many aspects of scientific research activity,what science and technology(S&T)journals can do to uphold research integrity and secure scholarly quality?What kind of revolution is needed in such a rapidly drifting world to hold on to the essential value of science? 展开更多
关键词 trusted research scientific revolution scientific research research integrity artificial intelligence uphold research integrity secure scholarly qualitywhat scholarly quality artificial intelligence ai
在线阅读 下载PDF
Adaptive Multi-Layer Defense Mechanism for Trusted Federated Learning in Network Security Assessment
5
作者 Lincong Zhao Liandong Chen +3 位作者 Peipei Shen Zizhou Liu Chengzhu Li Fanqin Zhou 《Computers, Materials & Continua》 2025年第12期5057-5071,共15页
The rapid growth of Internet of things devices and the emergence of rapidly evolving network threats have made traditional security assessment methods inadequate.Federated learning offers a promising solution to exped... The rapid growth of Internet of things devices and the emergence of rapidly evolving network threats have made traditional security assessment methods inadequate.Federated learning offers a promising solution to expedite the training of security assessment models.However,ensuring the trustworthiness and robustness of federated learning under multi-party collaboration scenarios remains a challenge.To address these issues,this study proposes a shard aggregation network structure and a malicious node detection mechanism,along with improvements to the federated learning training process.First,we extract the data features of the participants by using spectral clustering methods combined with a Gaussian kernel function.Then,we introduce a multi-objective decision-making approach that combines data distribution consistency,consensus communication overhead,and consensus result reliability in order to determine the final network sharing scheme.Finally,by integrating the federated learning aggregation process with the malicious node detection mechanism,we improve the traditional decentralized learning process.Our proposed ShardFed algorithm outperforms conventional classification algorithms and state-of-the-art machine learning methods like FedProx and FedCurv in convergence speed,robustness against data interference,and adaptability across multiple scenarios.Experimental results demonstrate that the proposed approach improves model accuracy by up to 2.33%under non-independent and identically distributed data conditions,maintains higher performance with malicious nodes containing poisoned data ratios of 20%–50%,and significantly enhances model resistance to low-quality data. 展开更多
关键词 trusted federated learning adaptive defense mechanism network security assessment participant trustworthiness scoring hybrid anomaly detection
在线阅读 下载PDF
The Current Situation and Trends of Trusted Execution Environment Applications
6
作者 Yanling Liu Yun Li 《Proceedings of Business and Economic Studies》 2025年第2期121-126,共6页
With the rapid development of digital technologies such as big data,cloud computing,and the Internet of Things(loT),data security and privacy protection have become the core challenges facing modern computing systems.... With the rapid development of digital technologies such as big data,cloud computing,and the Internet of Things(loT),data security and privacy protection have become the core challenges facing modern computing systems.Traditional security mechanisms are difficult to effectively deal with advanced adversarial attacks due to their reliance on a centralized trust model.In this context,the Trusted Execution Environment(TEE),as a hardware-enabled secure isolation technology,offers a potential solution to protect sensitive computations and data.This paper systematically discusses TEE's technical principle,application status,and future development trend.First,the underlying architecture of TEE and its core characteristics,including isolation,integrity,and confidentiality,are analyzed.Secondly,practical application cases of TEE in fields such as finance,the IoT,artificial intelligence,and privacy computing are studied.Finally,the future development direction of TEE is prospected. 展开更多
关键词 trusted execution environment Data security Privacy protection Cloud computing
在线阅读 下载PDF
TOWARDS A COMMUNITY OF SHARED FUTURE WITH NEIGHBORING COUNTRIES:REGIONAL EFFECTS OF THE CHINA-ASEAN PARTNERSHIP
7
作者 Guo Yanjun 《China Report ASEAN》 2025年第6期78-79,共2页
From the establishment of dialogue relations between China and ASEAN in 1991 to the 30th anniversary of their dialogue relations in 2021,bilateral ties have been continuously elevated to a comprehensive strategic part... From the establishment of dialogue relations between China and ASEAN in 1991 to the 30th anniversary of their dialogue relations in 2021,bilateral ties have been continuously elevated to a comprehensive strategic partnership.We have witnessed relentless enhancement of political mutual trust,deepening economic cooperation,and closer people-to-people exchanges.The sustained development of the China-ASEAN bilateral partnership is precisely what has generated significant positive spillover e!ects,driving profound changes in China’s relations with neighboring countries.The various levels of partnerships China has established with neighboring countries will play an important role in shaping a networked,non-hierarchical regional order in the future,and such relationships have already become a key pathway for China and its neighbors to jointly build a community with a shared future in the region. 展开更多
关键词 economic cooperation ASEAN enhancement political mutual trustdeepening China comprehensive strategic partnership dialogue relations people people exchanges political mutual trust
在线阅读 下载PDF
126例二期梅毒患者临床特征、实验室检查及预后分析
8
作者 杨艳萍 孙嘉昱 +1 位作者 蒲小霞 葛新红 《中国麻风皮肤病杂志》 2026年第1期15-18,共4页
目的:总结分析二期梅毒患者的临床表现、实验室检查特征以及不同治疗方案的预后状况。方法:回顾性分析2018年1月至2023年1月于宁夏回族自治区人民医院确诊为二期梅毒且规律复诊的126例患者资料,对其临床表现、实验室检查结果及治疗情况... 目的:总结分析二期梅毒患者的临床表现、实验室检查特征以及不同治疗方案的预后状况。方法:回顾性分析2018年1月至2023年1月于宁夏回族自治区人民医院确诊为二期梅毒且规律复诊的126例患者资料,对其临床表现、实验室检查结果及治疗情况进行描述性分析。结果:本组患者平均发病年龄为28.84岁(16~61岁),男女比例为1.74∶1。126例患者中二期梅毒神经损害1例,HIV感染4例,尖锐湿疣12例,同时合并尖锐湿疣和HIV 3例。皮损为躯干及四肢暗紫红色斑疹或斑片82例,其中伴有硬下疳5例;手掌、足底铜红色斑片、领圈状脱屑30例;虫蚀状脱发8例,肛周扁平湿疣6例。实验室检测结果示,所有患者TPHA、TRUST均呈阳性,TRUST滴度1∶8(6例)、1∶16(42例)、1∶32(46例)、1∶64(18例)、1∶128(10例)及1∶256(4例)。治疗上,119例接受苄星青霉素肌肉注射,5例口服多西环素,2例静脉输注头孢曲松钠;对于基线TRUST≥1∶64的32例患者,24例患者予以泼尼松治疗预处理,仅1例出现发热;8例直接予以苄星青霉素驱梅治疗,均出现发热。治疗3个月后,所有患者的TRUST滴度均下降4倍以上;6个月时,120例患者TRUST滴度降至1∶8以下;2年后,105例TRUST转阴,21例(16.67%)发生血清固定,其中合并HIV阳性组血清固定率(4/7)显著高于非HIV组(17/119,P=0.002);基线TRUST≥1∶64组患者血清固定率(12/32)显著高于TRUST≤1∶32组(9/94)。结论:二期梅毒最为常见的皮肤表现为躯干与四肢的暗紫红色斑疹或斑片。TRUST滴度≥1∶64或合并HIV感染的患者更易出现血清固定现象;而对于TRUST滴度≥1∶64的患者,在治疗中联合口服泼尼松可有效降低吉海反应的发生风险。 展开更多
关键词 二期梅毒 神经损害 HIV 尖锐湿疣 硬下疳 TRUST滴度 驱梅治疗 血清固定 吉海反应
暂未订购
A Year of Deepening China-Africa Bonds--Political trust,economic collaboration and cultural exchanges further solidify China-Africa ties
9
作者 HE WENPING 《ChinAfrica》 2026年第1期20-22,共3页
The year 2025 marks both the 25th anniversary of the Forum on China-Africa Cooperation(FOCAC)and the first year of implementation of the outcomes of the 2024 FOCAC Beijing Summit.Throughout the year,China has supporte... The year 2025 marks both the 25th anniversary of the Forum on China-Africa Cooperation(FOCAC)and the first year of implementation of the outcomes of the 2024 FOCAC Beijing Summit.Throughout the year,China has supported Africa in addressing historical injustices at diplomatic and political levels and firmly backed South Africa in hosting the G20 Leaders’Summit,further deepening China-Africa strategic mutual trust. 展开更多
关键词 Political Trust Forum China Africa Cooperation addressing historical injustices FOCAC China Africa Cooperation Strategic Mutual Trust Economic Collaboration Diplomatic Support
原文传递
Survey on Key Technology Development and Application in Trusted Computing 被引量:7
10
作者 Juan Wang Yuan Shi +5 位作者 Guojun Peng Huanguo Zhang Bo Zhao Fei Yan Fajiang Yu Liqiang Zhang 《China Communications》 SCIE CSCD 2016年第11期70-90,共21页
Trusted computing,which can effectively increase the credibility of information system,has made great achievements and is in continuous development. For country who is going to strengthen network construction like Chi... Trusted computing,which can effectively increase the credibility of information system,has made great achievements and is in continuous development. For country who is going to strengthen network construction like China,it is an important fundamental supporting technology worth researching. China is in the international forefront in the field of trusted computing. This paper gives comprehensive introductions to the new development and application of key technologies in trusted computing,such as various trusted platform modules(TPM、TCM、TPCM),TCG Software Stack(TSS),trusted cloud server and Trusted Execution Environment(TEE). We illustrate the progressing and application extension of these technologies and also point out some key problems worth studying in the future. 展开更多
关键词 cyberspace security information security information system security CRYPTOGRAPHY trusted computing
在线阅读 下载PDF
VLC-Based Indoor Positioning Algorithm Combined with OFDM and Particle Filter 被引量:10
11
作者 Jin Wang Haoxu Li +1 位作者 Xiaofeng Zhang Rangzhong Wu 《China Communications》 SCIE CSCD 2019年第1期86-96,共11页
Visible light communications(VLC) have recently attracted a growing interest and can be a potential solution to realize indoor positioning,however,the performance of existing indoor positioning system is limited by mu... Visible light communications(VLC) have recently attracted a growing interest and can be a potential solution to realize indoor positioning,however,the performance of existing indoor positioning system is limited by multipath distortion inside a room.In order to combat the effect of multipath distortion,this paper proposes an LED-based indoor positioning algorithm combined with hybrid OFDM(HOFDM),in which asymmetrically clipped optical OFDM(ACOOFDM) is transmitted on the odd subcarriers while using pulse amplitude modulated discrete multitone(PAM-DMT) to modulate the imaginary part of each even subcarrier.In this scheme,we take a combined approach where a received-signal-strength(RSS) technique is employed to determine the location of the receiver and realize the 3-D positioning by Trust-region-based positioning.Moreover,a particle filter is used to further improve the positioning accuracy.Results confirm that this proposed positioning algorithm can achieve high accuracy even with multipath distortion,and the algorithm has better performance when combined with particle filter. 展开更多
关键词 orthogonal frequency division multiplexing(OFDM) indoor positioning particle filter trust region VISIBLE light communications(VLC)
在线阅读 下载PDF
Behavior Measurement Model Based on Prediction and Control of Trusted Network 被引量:5
12
作者 Gong Bei Zhang Jianbiao +1 位作者 Shen Changxiang Zhang Xing 《China Communications》 SCIE CSCD 2012年第5期117-128,共12页
In order to construct the trusted network and realize the trust of network behavior,a new multi-dimensional behavior measurement model based on prediction and control is presented.By using behavior predictive equation... In order to construct the trusted network and realize the trust of network behavior,a new multi-dimensional behavior measurement model based on prediction and control is presented.By using behavior predictive equation,individual similarity function,group similarity function,direct trust assessment function,and generalized predictive control,this model can guarantee the trust of an end user and users in its network.Compared with traditional measurement model,the model considers different characteristics of various networks.The trusted measurement policies established according to different network environments have better adaptability.By constructing trusted group,the threats to trusted group will be reduced greatly.Utilizing trusted group to restrict individuals in network can ensure the fault tolerance of trustworthiness of trusted individuals and group.The simulation shows that this scheme can support behavior measurement more efficiently than traditional ones and the model resists viruses and Trojans more efficiently than older ones. 展开更多
关键词 trusted network behavioral predic-tive control SIMILARITY trust measurement
在线阅读 下载PDF
Development of Trusted Computing Research 被引量:5
13
作者 ZHANG Huanguo LUO Jie +3 位作者 JIN Gang ZHU Zhiqiang YU Fajiang YAN Fei 《Wuhan University Journal of Natural Sciences》 CAS 2006年第6期1407-1413,共7页
Trusted computing is the new trend of information security today. This paper surveys the theory and technology of trusted computing. The development history of trusted computing, and the development of trusted computi... Trusted computing is the new trend of information security today. This paper surveys the theory and technology of trusted computing. The development history of trusted computing, and the development of trusted computing in China are introduced in this paper, and then it analyzes some problems of trusted computing at present which are delay in theory research, some key technologies to be developed and lack of trusted software system. Some fields are worthy to be explored on are pointed out including key technology, basic theory and application in trusted computing. 展开更多
关键词 COMPUTER trusted computing secure computer information security
在线阅读 下载PDF
Protecting Terminals by Security Domain Mechanism Based on Trusted Computing 被引量:5
14
作者 ZHOU Zheng ZHANG Jun +1 位作者 LI Jian LIU Yi 《Wuhan University Journal of Natural Sciences》 CAS 2006年第6期1437-1440,共4页
Networks are composed with servers and rather larger amounts of terminals and most menace of attack and virus come from terminals. Eliminating malicious code and ac cess or breaking the conditions only under witch att... Networks are composed with servers and rather larger amounts of terminals and most menace of attack and virus come from terminals. Eliminating malicious code and ac cess or breaking the conditions only under witch attack or virus can be invoked in those terminals would be the most effec tive way to protect information systems. The concept of trusted computing was first introduced into terminal virus immunity. Then a model of security domain mechanism based on trusted computing to protect computers from proposed from abstracting the general information systems. The principle of attack resistant and venture limitation of the model was demonstrated by means of mathematical analysis, and the realization of the model was proposed. 展开更多
关键词 trusted computing security domain mechanism attack immunity venture limitation
在线阅读 下载PDF
A Trusted Measurement Scheme Suitable for the Clients in the Trusted Network 被引量:3
15
作者 GONG Bei ZHANG Jianbiao +1 位作者 YE Xiaolie SHEN Changxiang 《China Communications》 SCIE CSCD 2014年第4期143-153,共11页
The trusted network connection is a hot spot in trusted computing field and the trust measurement and access control technology are used to deal with network security threats in trusted network.But the trusted network... The trusted network connection is a hot spot in trusted computing field and the trust measurement and access control technology are used to deal with network security threats in trusted network.But the trusted network connection lacks fine-grained states and real-time measurement support for the client and the authentication mechanism is difficult to apply in the trusted network connection,it is easy to cause the loss of identity privacy.In order to solve the abovedescribed problems,this paper presents a trust measurement scheme suitable for clients in the trusted network,the scheme integrates the following attributes such as authentication mechanism,state measurement,and real-time state measurement and so on,and based on the authentication mechanism and the initial state measurement,the scheme uses the realtime state measurement as the core method to complete the trust measurement for the client.This scheme presented in this paper supports both static and dynamic measurements.Overall,the characteristics of this scheme such as fine granularity,dynamic,real-time state measurement make it possible to make more fine-grained security policy and therefore it overcomes inadequacies existing in the current trusted network connection. 展开更多
关键词 trusted computing trusted network AUTHENTICATION state measurement real-time measurement
在线阅读 下载PDF
Modeling Trusted Computing 被引量:3
16
作者 CHEN Shuyi WEN Yingyou ZHAO Hong 《Wuhan University Journal of Natural Sciences》 CAS 2006年第6期1507-1510,共4页
In this paper, a formal approach based on predicate logic is proposed for representing and reasoning of trusted computing models. Predicates are defined to represent the characteristics of the objects and the relation... In this paper, a formal approach based on predicate logic is proposed for representing and reasoning of trusted computing models. Predicates are defined to represent the characteristics of the objects and the relationship among these objects in a trusted system according to trusted computing specifications. Inference rules of trusted relation are given too. With the semantics proposed, some trusted computing models are formalized and verified, which shows that Predicate calculus logic provides a general and effective method for modeling and reasoning trusted computing systems. 展开更多
关键词 trusted computing group (TCG) trusted platform module (TPM) trusted computing root of trust predicate logic
在线阅读 下载PDF
Trusted Data Acquisition Mechanism for Cloud Resource Scheduling Based on Distributed Agents 被引量:4
17
作者 李小勇 杨月华 《China Communications》 SCIE CSCD 2011年第6期108-116,共9页
Goud computing is a new paradigm in which dynamic and virtualized computing resources are provided as services over the Internet. However, because cloud resource is open and dynamically configured, resource allocation... Goud computing is a new paradigm in which dynamic and virtualized computing resources are provided as services over the Internet. However, because cloud resource is open and dynamically configured, resource allocation and scheduling are extremely important challenges in cloud infrastructure. Based on distributed agents, this paper presents trusted data acquisition mechanism for efficient scheduling cloud resources to satisfy various user requests. Our mechanism defines, collects and analyzes multiple key trust targets of cloud service resources based on historical information of servers in a cloud data center. As a result, using our trust computing mechanism, cloud providers can utilize their resources efficiently and also provide highly trusted resources and services to many users. 展开更多
关键词 cloud computing trusted computing distributed agent resource scheduling
在线阅读 下载PDF
A Trusted Attestation Mechanism for the Sensing Nodes of Internet of Things Based on Dynamic Trusted Measurement 被引量:10
18
作者 Bei Gong Yubo Wang +2 位作者 Xiangang Liu Fazhi Qi Zhihui Sun 《China Communications》 SCIE CSCD 2018年第2期100-121,共22页
Internet of things has been widely applied to industrial control, smart city and environmental protection, in these applica- tion scenarios, sensing node needs to make real-time response to the feedback control of the... Internet of things has been widely applied to industrial control, smart city and environmental protection, in these applica- tion scenarios, sensing node needs to make real-time response to the feedback control of the application layer. Therefore, it is nec- essary to monitor whether or not awareness nodes are trusted in real time, but the existing mechanisms for trusted certification lack the real-time measurement and tracking of the sensing node. To solve the above problems, this paper proposes a dynamic metric based authentication mechanism for sensing nodes of Internet of things. Firstly, the dynamic trustworthiness measure of the sensing nodes is carried out by introducing the computational function such as the trust function, the trust- worthiness risk assessment function, the feed- back control function and the active function of the sensing node. The dynamic trustworthi- ness measure of sensing nodes from multiple dimensions can effectively describe the change of trusted value of sensing nodes. Then, on the basis of this, a trusted attestation based on node trusted measure is realized by using the revocable group signature mechanism of local verifier. The mechanism has anonymity, un- forgeability and traceability, which is proved the security in the standard model. Simulationexperiments show that the proposed trusted attestation mechanism is flexible, practical and ef|Scient and has better attack resistance. It can effectively guarantee the reliable data transmission of nodes and realize the dynamic tracking of node reliability, which has a lower impact on system performance. 展开更多
关键词 internet of things: trusted mea-surement trusted attestation: group signature
在线阅读 下载PDF
A Novel Direct Anonymous Attestation Protocol Based on Zero Knowledge Proof for Different Trusted Domains 被引量:3
19
作者 YANG Yatao CAO Lulin LI Zichen 《China Communications》 SCIE CSCD 2010年第4期172-175,共4页
In order to solve the issue that existing direct anonymous attestation (DAA) scheme can not operate effectively in different domains,based on the original DAA scheme,a novel direct anonymous attestation protocol used ... In order to solve the issue that existing direct anonymous attestation (DAA) scheme can not operate effectively in different domains,based on the original DAA scheme,a novel direct anonymous attestation protocol used in multi domains environment is proposed and designed,in which,the certificate issuer located in outside of domain can be considered as a proxy server to issue the DAA certificate for valid member nodes directly.Our designed mechanism accords with present trusted computing group (TCG) international specification,and can solve the problems of practical authentication and privacy information protection between different trusted domains efficiently.Compared with present DAA scheme,in our protocol,the anonymity,unforgeability can be guaranteed,and the replay-attack also can be avoided.It has important referenced and practical application value in trusted computing field. 展开更多
关键词 Network Security trusted Computing Direct Anonymous Attestation trusted Domain.
在线阅读 下载PDF
Implementing Operating System Support for Extended Trusted Path in TPM-Capable Environments 被引量:3
20
作者 SHI Wenchang 《Wuhan University Journal of Natural Sciences》 CAS 2006年第6期1493-1497,共5页
Trusted path is one of the crucial features that operating systems must provide for fundamental security support. In order to explore the possibility of implementing a trusted path mechanism with the support of truste... Trusted path is one of the crucial features that operating systems must provide for fundamental security support. In order to explore the possibility of implementing a trusted path mechanism with the support of trusted platform module (TPM) technologies, and to support TPM capabilities in operating systems, the paper extended the scope of the conventional trusted path to cover the situation in which a user communicates with software residing on a remote host. The paper combined the concept of operating system support for trusted path with that for TPM platforms, and proposed the architecture of an extended trusted path mechanism in operating system with considerations on TPM-capable platforms support. As part of the author's research in secure operating systems, the work of the paper was carried out with Linux as an experimental prototype system. The research result shows that TPM capabilities can strengthen extended trusted path mechanisms of operating systems. 展开更多
关键词 operating system trusted path trusted platform module (TPM) trusted software
在线阅读 下载PDF
上一页 1 2 70 下一页 到第
使用帮助 返回顶部