期刊文献+
共找到2篇文章
< 1 >
每页显示 20 50 100
A New Approach of TPM Construction Based on J2810 被引量:1
1
作者 ZHAO Bo ZHANG Huanguo HUANG Rui 《Wuhan University Journal of Natural Sciences》 CAS 2007年第1期21-24,共4页
Trusted platform model (TPM) is special-purpose integrated circuits (ICs) built into a variety of platforms to enable strong user authentication and machine attestation-essential to prevent inappropriate access to... Trusted platform model (TPM) is special-purpose integrated circuits (ICs) built into a variety of platforms to enable strong user authentication and machine attestation-essential to prevent inappropriate access to confidential and sensitive information and to protect against compromised networks. Existing TPM products have some limitations. This paper adopts J2810TPM Single Chip cryptogram MCU produced by Jetway Company to construct typical TPM after comparing existing TPM products. Finally, an improved construction approach of TPM based on J2810 is proposed. 展开更多
关键词 trusted platform model(TPM) trusted computing J2810
在线阅读 下载PDF
Operating system network security enhancement scheme based on trusted storage
2
作者 Longyun Qi Xiaoliang Lv +3 位作者 Lianwen Sun Tianle Yao Jianye Yu Lei Wang 《Intelligent and Converged Networks》 EI 2023年第2期127-141,共15页
Data storage security has become the core of many network security issues.In order to achieve trusted storage and trusted measurement of network community data,this paper proposes a secure storage model based on trust... Data storage security has become the core of many network security issues.In order to achieve trusted storage and trusted measurement of network community data,this paper proposes a secure storage model based on trust extension for existing trusted storage technologies.In the process of document encryption,the key information is encrypted as well as decentralized stored by optimizing the ciphertext inverted index structure and update policy to ensure the security of index information.In the process of user access control mechanism,SAML and XACML are used in combination with role-based access control in order to achieve flexible and efficient authorization and access control.In the process of result query,ontology technology is introduced to better express the user’s query intention and improve the query accuracy.A large number of experiments demonstrate the effectiveness and feasibility of the scheme. 展开更多
关键词 trusted storage trust extension trusted platform model(TPM) access control
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部