Full-Text Search:
Home|Journal Papers|About CNKI|User Service|FAQ|Contact Us|中文
《Computer Science》 2008-10
Add to Favorite Get Latest Update

Development of the Transitive Trusted Chain Based on TPM

TAN Liang1,2 XU Zhi-wei1(Institute of Computing Technology,Chinese Academy of Sciences,Beijing100080,China)1(College of Computer,Sichuan Normal University,Chengdu 610066,China)2  
The issue of the transitive trusted chain is the foundation for trusted computing.This paper surveys the technologies and the theories of the transitive trusted chain,including the technology projects of the transitive trusted chain,the technologies of the trust for measurement,the theories of the transitive trusted chain and the trust for measurement.Some fields are worthy to be explored are pointed out including some key technologies,such as the static trust for measurement and the dynamic trust for measurement,and some foundation theories,such as the level model of the trusted chain,the trust loss model and the theory of the dynamic trust for measurement for software,and so on.
【Fund】: 四川省科技攻关项目2008JY0105-2支持
【CateGory Index】: TP393.08
Download(CAJ format) Download(PDF format)
CAJViewer7.0 supports all the CNKI file formats; AdobeReader only supports the PDF format.
【References】
Chinese Journal Full-text Database 10 Hits
1 CHEN Luxi(Wuhan University,School of Computer Science,Information Security Department,Wuhan 430079);Non-interference Property Modeling With TCG Trusted Chain[J];Computer Programming Skills & Maintenance;2009-16
2 CAO Ting,WANG Yan-xing(College of Computer,Beijing University of Technology,Beijing 100124,China);Research on Software Architecture of Food Safety Traceability System Based on Trust Computing[J];Computer Knowledge and Technology;2010-10
3 FANG Juan,ZENG Hong-li (Beijing University of Technology,College of Computer Science,Beijing 100124,China);The Model of Assessment Based on Credibility of the Hierarchy[J];Computer Security;2010-05
4 Hu Xiao-bing,Feng Guang(Center of Network Information & Modern Education Technology,Guangdong University of Technology,Guangzhou 510006,China);Trusted Network Management System Based on Trusted Computing[J];Journal of Guangdong University of Technology;2009-03
5 Zuo Shuangyong (School of Mathematics and Computational Science,Guilin University of Electronic Technology,Guilin 541004,China);Development of the transitive trusted chain research[J];Journal of Guilin University of Electronic Technology;2010-04
6 Zhang Gongxuan,Shen Chuangye,Wang Pingli,and Wang Ling(School of Computer Science & Technology,Nanjing University of Science & Technology,Nanjing 210094);Trusted Chain Tracing-Dynamic Technique for Removable Storage Information[J];Journal of Computer Research and Development;2011-S1
7 GONG Lei1,2,3,ZHAO Yong3,HAN Pei-sheng1,3,LI Yu31.Institute of Electronic Technology,Information Engineering University,Zhengzhou 450004,China 2.Key Lab of Information Network Security,Ministry of Public Security,Shanghai 201204,China 3.Institute of Computer Science,Beijing University of Technology,Beijing 100124,China;Research on security protective framework for typical application system[J];Computer Engineering and Applications;2010-28
8 SI Li-min CAI Mian CHEN Yin-jing GUO Ying(Dept.of Computer,Beijing University of Technology,Beijing 100124,China);Research of a Trust Chain Transfer Model[J];Computer Science;2011-09
9 XU Qin-gui1,2,LIU Gui-xiong2,GAO Fu-rong3(1.College of Computer,Dongguan University of Technology,Dongguan Guangdong 523808,China; 2.School of Mechanical and Automotive Engineering,South China University of Technology,Guangzhou Guangdong 510640,China; 3.Guangdong Institute of Metrology,Guangzhou Guangdong 510405,China);Software protection model for measurement applications[J];Journal of Computer Applications;2011-04
10 FENG Guang LIU Yi-xin (Center of Campus Network & Modern Educational Technology,Guangdong University of Technology Guangzhou Guangdong, 510006);Implemention of Trustworthy Master Information System[J];Science & Technology Information;2009-23
China Proceedings of conference Full-text Database 1 Hits
1 Zhang Gongxuan,Shen Chuangye,Wang Pingli,and Wang Ling (School of Computer Science & Technology,Nanjing University of Science & Technology,Nanjing 210094);Trusted Chain Tracing-Dynamic Technique for Removable Storage Information[A];[C];2010
【Citations】
Chinese Journal Full-text Database 5 Hits
1 Li Xiaoyong Shen Changxiang Doctoral Candidate;Information Security Architecture Center,Beijing Jiaotong University,Beijing 100044,China.;Research to a dynamic application transitive trust model[J];Journal of Huazhong University of Science and Technology;2005-S1
2 FANG Yanxiang1,HUANG Tao2(1.College of Information Technical Science,Nankai University,Tianjin 300071;2.College of Electronic Technology,PLA Information Engineering University,Zhengzhou 450052);Design and Implementation of Trusted Startup Process for Linux[J];Computer Engineering;2006-09
3 TANG Wen, CHEN Zhong (Department of Computer Science and Technology, Peking University, Beijing 100871, China);Research of Subjective Trust Management Model Based on the Fuzzy Set Theory[J];Journal of Software;2003-08
4 ZHANG Huanguo~(1,2),LUO Jie~1,JIN Gang~1,ZHU Zhiqiang~1,YU Fajiang~1,YAN Fei~1(1.School of Computer,Wuhan University,Wuhan 430072,Hubei,China;2.State Key Laboratory of Software Engineering,Wuhan University,Wuhan 430072,Hubei,China);Development of Trusted Computing Research[J];Journal of Wuhan University(Natural Science Edition);2006-05
5 YUAN Lulai,ZENG Guosun,WANG Wei(Department of Computer Science and Technology,Tongji University,Shanghai 201804,China);Trust Evaluation Model Based on Dempster-Shafer Evidence Theory[J];Journal of Wuhan University(Natural Science Edition);2006-05
【Co-citations】
Chinese Journal Full-text Database 10 Hits
1 MA Zhuo,MA Jian-feng,YANG Chao,YANG Li (School of Computer Science & Technology,Xidian University,Xi'an 710071,China);Trusted Network Connect Protocol for Wireless Environment[J];Journal of Beijing University of Technology;2010-05
2 WANG Yong1,DAI Gui-ping2,HOU Ya-rong1,FANG Juan1,MAO Guo-jun1(1.College of Computer Science & Technology,Beijing University of Technology,Beijing 100124,China;2.College of Electronic Information & Control Engineering,Beijing University of Technology,Beijing 100124,China);Group Trust Model Based on Fuzzy Logic[J];Journal of Beijing University of Technology;2010-07
3 WANG Yong1,DAI Gui-ping2,HOU Ya-rong1,REN Xing-tian1(1.College of Computer Science,Beijing University of Technology,Beijing 100124,China;2.College of Electronic Information and Control Engineering,Beijing University of Technology,Beijing 100124,China);Trust Degree Evaluation Method of Composite Service Based on Fuzzy Logic[J];Journal of Beijing University of Technology;2010-12
4 LIU Yu-long~1,CAO Yuan-da~2 (1.Department of Computer Science and Engineering, School of Information Science and Technology, Beijing Institute of Technology, Beijing100081, China; 2.School of Computer Software, Beijing Institute of Technology, Beijing100081, China);Subjective Trust Model in Distributed Network[J];Journal of Beijing Institute of Technology;2005-06
5 LI Jia-lun,GU Li-ze,YANG Yi-xian(State Key Laboratory of Networking and Switching Technology,Beijing University of Posts and Telecommunications,Beijing 100876,China);A New Trust Management Model for P2P Networks[J];Journal of Beijing University of Posts and Telecommunications;2009-02
6 JIN Bei-bei1,2,ZHANG Shi-bin1(1.Computer Department,Chengdu University of Information Technology,Chengdu 610225,China;2.Institute of Physics and Electronic Information,Anhui Normal University,Wuhu 241000,China);Trusted computing platform and its current research[J];Journal of Changchun University;2007-04
7 CHEN Shu-yi,WEN Ying-you,ZHAO Hong(School of Information Science & Engineering,Northeastern University,Shenyang 110004,China.);Conceptual Design of Trusted Mobile Platform[J];Journal of Northeastern University(Natural Science);2008-08
8 YANG Li and MA Jian-feng (Key Laboratory of Computer Networks and Information Security,Ministry of Education,Xidian University Xi'an 710071);Trusted Mutual Authentication Scheme with Smart Cards and Passwords[J];Journal of University of Electronic Science and Technology of China;2011-01
9 Liu Shuangxi,Wang Cuiru(School of Computer Science and Technology,North China Electric Power University,Baoding 071003,China);Study on the Trust-based RBAC Assignment Model[J];Electric Power Science and Engineering;2009-03
10 ;Research on Semantic Demonstration Model of Trusted Computing[J];Computer Development & Applications;2010-08
China Proceedings of conference Full-text Database 5 Hits
1 ZHOU Zhenliu, XU Rongsheng (Computing center, Institute of High Energy Physics, CAS, Beijing, 100049);Research on Architecture and Technologies of Trusted Computing[A];[C];2006
2 LI Lin, Li Taoshen, GE Zhihui, LIAO Qiyao;Study on Trust Mechanism of Manufacturing Grid[A];[C];2009
3 PEN Lin~1 FENG Jun-huan~2 Southwest Jiaotong University Chengdu.Sichuan 610031;A Security Mechanism Based on Fuzzy Trust in Manet[A];[C];2008
4 Wu Xue -lai,Sun Yuqiong,Xin Yang,Li hui (School of Computer,Beijing University of Posts and Telecommunications,Beijing 100876,China);An Improved method for IMA based on Application Group[A];[C];2009
5 Zhang Xiao-qin~1,Chen Shu-yu~2,Chang Guang-hui~1,Lu Hua-wei~1 (1.School of Computer Science,Chongqing University,Chongqing 400030,China;2.School of Software Engineering of Chongqing University, Chongqing 400030,China);Trust evaluation model in Trustworthy Network[A];[C];2011
【Co-references】
Chinese Journal Full-text Database 10 Hits
1 SHAN Jinhui 1),2) JIANG Ying 1),3) SUN Ping 2) ( 1)Software Institute, Peking University, Beijing, 100871, 2)Jiuquan Satellite Launch Center; 3) Faculty of Information Engineering and Automation, Kunming University of Science and Technology, Kunming 650093);Research Progress in Software Testing[J];Acta Scicentiarum Naturalum Universitis Pekinesis;2005-01
2 ZHANG Li-qiang1,2,ZHANG Huan-guo2,3,ZHANG Fan4 (1.State Key Lab of Software Engineering,Wuhan University,Wuhan 430072,China;2.Computer School,Wuhan University,Wuhan 430072,China;3.Key Lab of Aerospace Information Security and Trusted Computing,Wuhan University,Wuhan 430072,China;4.College of Communication Engineering,Hangzhou Dianzi University,Hangzhou 310018,China);The Trust Measurement Scheme in Trusted Computing[J];Journal of Beijing University of Technology;2010-05
3 SUN Ling-fang~1 XU Jin-bo~2 ZHU Yun (School of Economics and Management,Jiangsu University of science and technology,212003,China);A Secure Technology of E-Commerce Based On SET[J];Commercial Research;2007-02
4 WANG Zhe-kun,TANG Yun-ge (Army Unit 63880,Loyang 471003,China);A new type of designed methodology about PKI trust chain[J];Journal of Chengdu University of Information Technology;2007-05
5 SUN Qi;YANG Chang;ZHANG Miao;SHEN Zhi-dong;ZHANG Huan-guo(School of Computer,Wuhan University,Wuhan,Hubei 430079,China);Research on Architecture of TCG Software Stack[J];Journal of Chuxiong Normal University;2006-12
6 ZHOU Ming-tian~1 TAN Liang~2 (1.School of Computer Science and Engineering,Univ.of Electron.Sci.& Tech.of China Chengdu 610054; 2.Software Key Lab.of Sichuan Province,Sichuan Normal University Chengdu 610066);Progress in Trusted Computing[J];Journal of University of Electronic Science and Technology of China;2006-S1
7 LI Lei, HOU Fang-yong, CHEN Jian-xun (School of Computer, National University of Defence Technology, Changsha 410073, China);The Development and Research of Mobile Trusted Platform[J];Computer Knowledge and Technology;2010-08
8 CHEN Ji-rong (Computer Technology Department, Bengbu Tank Institute, Bengbu 233050, China);Analysis of EUCALYPTUS Infrastructure for Constructing Private Cloud Computing Platform[J];Computer Knowledge and Technology;2010-15
9 Frank Altschuler Bruno Zoppis, Trango Virtual Processors;Embedded System Security An Overview and Analysis of Attack Profiles and Defense Strategies[J];Electronic Engineering & Product World;2008-07
10 XU Xin-jian,ZHU Jian-hua (HaiMen Power Supply Company, HaiMen ,226100,P.R.China);A Fault Network Diagnosis Based The Analytic Hierarchy Proccssing[J];Computer Security;2008-08
【Secondary References】
Chinese Journal Full-text Database 7 Hits
1 Xue Wenhu Xu Yanyi Liu Yue (Electronics Engineering College,Naval University of Engineering,Wuhan 430033);Application of virtualization technology in automatic test equipment upgrade[J];Electronic Measurement Technology;2011-12
2 You Bin Wei Wei Liu Xiaoran Cui Jinsheng(Information Department,Naval Command College,Nanjing 211800);Study of Active Network-based Security Defence System for the Military[J];Ship Electronic Engineering;2011-11
3 HE Hui,JIANG Shui,LI Li-hao,SANG Yun(The 32nd Research Institute of China Electronics Technology Group Corporation,Shanghai 200233,China);Research on Localized Virtual Trusted Computing Platform Based on TCM[J];Computer Engineering;2011-S1
4 SHI Yuan-bing(No.30 Institute of CETC,Chengdu Sichuan 610041,China);Study on Trusted Application based on Trusted Computing[J];Information Security and Communications Privacy;2010-12
5 XU Jun(Shanghai KOAL Soft Co.Ltd.,Shanghai 200042,China);Enhancement of OCSP Performance of Mass Certification System by Serial Number Design[J];Information Security and Communications Privacy;2012-09
6 YU Qin-yong,TONG bin,CHEN lin (Chengdu Westone Information Industry Co.,Ltd.,Chengdu Sichuan 610041,China);Overeview Virtualized Security[J];Information Security and Communications Privacy;2012-11
7 Lü Yin-run1,ZHENG Li-min1,2,*(1.College of Information and Electrical Engineering,China Agricultural University,Beijing 100083,China; 2.Food Quality and Safety Laboratory,Beijing 100083,China);Recent Applications of RFID in Livestock Traceability System[J];Meat Research;2013-05
【Secondary Citations】
Chinese Journal Full-text Database 10 Hits
1 ZHOU Ming-tian~1 TAN Liang~2 (1.School of Computer Science and Engineering,Univ.of Electron.Sci.& Tech.of China Chengdu 610054; 2.Software Key Lab.of Sichuan Province,Sichuan Normal University Chengdu 610066);Progress in Trusted Computing[J];Journal of University of Electronic Science and Technology of China;2006-S1
2 SUN Dong mei,QIU Zheng ding (Institute of Information Science,Northern Jiaotong University,Beijing 100044,China);A Survey of the Emerging Biometric Technology[J];Acta Electronica Sinica;2001-S1
3 CHEN Huo-wang,WANG Ji,Dong Wei (School of Computer,National University of Defense Technology,Changsha,Hunan 410073,China);High Confidence Software Engineering Technologies[J];Acta Electronica Sinica;2003-S1
4 TAN Liang 1,2 ,LIU Zhen 1,SHE Kun 1,ZHOU Ming tian 1 (1.School of Comp.Sci.& Engn.,Univ.of Electronic Sci.& Tech.of China Information Security United Lab of UESTC Westone, Chengdu,Sichuan 610054,China;2.college of Electronic Engineering,Sichuan Normal University,Chengdu,Sichuan 610066,China);Research on the Segmented and Over-Issued CRL Synthesis Model[J];Acta Electronica Sinica;2005-02
5 Li Xiaoyong Shen Changxiang Doctoral Candidate;Information Security Architecture Center,Beijing Jiaotong University,Beijing 100044,China.;Research to a dynamic application transitive trust model[J];Journal of Huazhong University of Science and Technology;2005-S1
6 Zhu Junmao1, Yang Shoubao1, Fan Jianping2, and Chen Mingyu21(Department of Computer Science and Technology, University of Science and Technology of China, Hefei 230026)2(Institute of Computing Technology, Chinese Academy of Sciences, Beijing 100080);A Grid & P2P Trust Model Based on Recommendation Evidence Reasoning[J];Journal of Computer Research and Development;2005-05
7 Tan Liang1,2 and Zhou Mingtian11(School of Computer Science & Engineering, University of Electronic Science & Technology of China, Chengdu 610054)2(Software Key Laboratory of Sichuan, Sichuan Normal University, Chengdu 610066);XSSA/ADL:An XML-Based Security Requirement Architecture Description Language[J];Journal of Computer Research and Development;2007-05
8 Li Jun and Sun Yufang(Institute of Software,Chinese Academy of Sciences,Beijing 100080);COMPUTER SECURITY AND SECURITY MODEL[J];JOURNAL OF COMPUTER RESEARCH AND DEVELOPMENT;1996-04
9 Zhu Jing Shen Meiming Wang Dongsheng (Department of Computer Science and Technology,Tsinghua University,Beijing 100084);Performance Analysis and Test of Web Service System[J];Computer Engineering and Applications;2001-15
10 TAN Liang;SHE Kun;ZHOU Ming-Tian School of Comp. Sci. & Engn.. Univ. of Electronic Sci. & Tech. of China, Information Security United Lab of UESTC-Westone, Chengdu 610054 College of Electronic Engineering, Sichuan Normal University. Chengdu 610066;Research on the Delta and Over-Issued CRL Synthesis Model[J];Computer Science;2005-04
©2006 Tsinghua Tongfang Knowledge Network Technology Co., Ltd.(Beijing)(TTKN) All rights reserved