Full-Text Search:
Home|Journal Papers|About CNKI|User Service|FAQ|Contact Us|中文
《Journal of Wuhan University(Natural Science Edition)》 2015-01
Add to Favorite Get Latest Update

Visual Trusted Computing Platform Computer Aided Instruction System Design and Implementation

HAO Yanjun;BAO Guoqi;LIU Yi;School of Computer Science and Technology,Guangdong University of Technology;Guangdong Provincial Public Security Department;  
Trusted Computing Group(TCG)technology can be used to enhance the security of the existed computing environment,such as cloud computing environment.A visual TCG aided instruction system will be helpful to study TCG technology.There exists open-source TSS Project:TrouSerS and open-source software TPM Project:TPM-Emulator already.Base on Migrated TrouSerS and TPM-Emulator,tracing,program debugging and visualization technology,a Windows platform TCG computer aided instruction(CAI)system was designed and implemented.By using this CAI system,the user can tack and analyze the full steps of the TCG authority protocols,etc.All the results of the CAI system are shown in visual and easy understanding mode.In one words,with the computer aided instruction system,one can get twice the results in half the time.
【Fund】: 国家科技支撑计划项目(2012BAH27F05);; 广东省自然科学基金重点项目(S2012020011071);; 广东省教育部产学研合作项目(2012B091000037 2012B091000041);; 广州市科技计划项目(2013J4300058);; 广东高校优秀青年创新人才培养计划项目(LYM09066)
【CateGory Index】: TP311.52
Download(CAJ format) Download(PDF format)
CAJViewer7.0 supports all the CNKI file formats; AdobeReader only supports the PDF format.
【Citations】
Chinese Journal Full-text Database 1 Hits
1 HAO Yanjun1,BAO Guoqi2,LIU Yi1,LING Jie1(1.Faculty of Computer,Guangdong University of Technology,Guangzhou 510006,Guangdong,China;2.Guangdong Provincial Public Security Department,Guangzhou 500000,Guangdong,China);Migration of TrouSerS to Windows Platform[J];Journal of Wuhan University(Natural Science Edition);2010-02
【Co-citations】
Chinese Journal Full-text Database 10 Hits
1 ;Analysis on Trusted Computing Standards: from the Point View of Comparing de jure Sandard and de fact Standard[J];Information Technology & Standardization;2012-06
2 Li Zhen Tian Jun-feng Zhao Peng-yuan(College of Mathematics and Computer,Hebei University,Baoding 071002,China);A Trustworthy Behavior Model for Software Monitoring Point Based on Classification Attributes[J];Journal of Electronics & Information Technology;2012-06
3 Zuo Shuangyong (School of Mathematics and Computational Science,Guilin University of Electronic Technology,Guilin 541004,China);Development of the transitive trusted chain research[J];Journal of Guilin University of Electronic Technology;2010-04
4 Lei Yueju,Chen Guangxi(School of Mathematics and Computational Science,Guilin University of Electronic Technology,Guilin 541004,China);Subjective trust evaluation model based on fuzzy decision theory[J];Journal of Guilin University of Electronic Technology;2011-06
5 Wen Yuanmei1,2 Luo Li1 Huang Jingchao1 Liu Guixiong2(1.School of Information Engineering,Guangdong University of Technology 2.School of Mechanical & Automotive Engineering,South China University of Technology);The Trust Integrated Platform Frame of LED Display Based on Internet of Things[J];Automation & Information Engineering;2012-01
6 LIU Ming-fang,LI Wen-feng,ZHAO Yang(Beijing University of Technology,College of Computer Science,Beijing 100124);An XEN Platform Based Trusted Virtual Machine Migration Protocol[J];Computer Security;2013-03
7 CHENG Guo-yong,HAN Yong-fei,WANG Hui-xia(College of Computer Sciences,Beijing University of Technology,Beijing 100124,China);Trusted Eencryption Disk Research and Implementation Based on Virtual Disk[J];Computer and Information Technology;2013-02
8 WANG Dan,SUN Hao-yang,WANG Jin,FU Li-hua(College of Computer Science,Beijing University of Technology,Beijing 100124,China);Trusted Analysis Model for Interactive Behavior of a Software System Based on Slicing Technology[J];Journal of Beijing University of Technology;2013-05
9 ;Research on the application of cognitive computing in network security situation awareness[J];Popular Science & Technology;2014-02
10 XIE Wen-jun;FU Xiao;YU Zhen-hua;HAN Lin;School of Information and Navigation,Air Force Engineering University;;Modeling Software Trustworthiness Evolution of Cyber-Physical Systems Using Nonlinear Dynamics[J];Telecommunication Engineering;2014-02
China Proceedings of conference Full-text Database 1 Hits
1 QIN Kun-wen,CHEN Zhen-xiang,SUN Tao (Shandong Provincial Key Laboratory of Network Based Intelligent Computing,University of Jinan, Jinan 250022,China);Research and implementation of trusted bootstrap based on PXA[A];[C];2013
【Secondary Citations】
Chinese Journal Full-text Database 10 Hits
1 CHEN Huo-wang,WANG Ji,Dong Wei (School of Computer,National University of Defense Technology,Changsha,Hunan 410073,China);High Confidence Software Engineering Technologies[J];Acta Electronica Sinica;2003-S1
2 SHEN ChangXiang1, ZHANG HuangGuo2, FENG DengGuo3, CAO ZhenFu4 & HUANG JiWu5 1 Computing Technology Institute of China Navy, Beijing 100841, China; 2 School of Computer, Wuhan University, Wuhan 430072, China; 3 Institute of Software, Chinese Academy of Sciences, Beijing 100080, China 4 Department of Computer Science and Technology, Shanghai Jiaotong University, Shanghai 200030, China; 5 Information Technology Institute, Zhongshan University, Guangzhou 510275, China;Survey of information security[J];中国科学(F辑:信息科学)(英文版);2007-03
3 Zhan Jing1,2 and Zhang Huanguo1,2,31(School of Computer Science,Wuhan University,Wuhan 430072)2(Key Laboratory of Aerospace Information Security and Trusted Computing of Ministry of Education,Wuhan University,Wuhan 430072)3(State Key Laboratory of Software Engineering,Wuhan University,Wuhan 430072);Automated Testing of the Trusted Platform Module[J];Journal of Computer Research and Development;2009-11
4 MIN Ying-hua(Institute of Computing Technology, Chinese Academy of Sci ences,Beijing 100080,China;Dependable Systems and Networks[J];Computer Engineering & Science;2001-05
5 LIN Chuang PENG Xue-Hai (Department of Computer Science and Technology, Tsinghua University, Beijing 100084);Research on Trustworthy Networks[J];Chinese Journal of Computers;2005-05
6 XU Ming-Di ZHANG Huan-Guo YAN Fei(Key Laboratory of Aerospace Information Security and Trust Computing of Ministry of Education,Wuhan 430072)(School of Computer,Wuhan University,Wuhan 430079)(State Key Laboratory of Software Engineering,Wuhan University,Wuhan 430072);Testing on Trust Chain of Trusted Computing Platform Based on Labeled Transition System[J];Chinese Journal of Computers;2009-04
7 CHEN Xiao-Feng(State Key Laboratory of Information Security,Institute of Software,Chinese Academy of Sciences,Beijng 100190)(National Engineering Research Center of Information Security,Beijing 100190);The Formal Analysis and Testing of Trusted Platform Module[J];Chinese Journal of Computers;2009-04
8 LI Hao1),2) HU Hao1),2),3) CHEN Xiao-Feng1),2)1)(State Key Laboratory of Information Security,Institute of Software,Chinese Academy of Sciences,Beijing 100190) 2)(National Engineering Research Center of Information Security,Beijing 100190) 3)(Department of Electronic Engineering and Information Science,University of Science and Technology of China,Hefei 230027);Research on Compliant Testing Method of Trusted Cryptography Module[J];Chinese Journal of Computers;2009-04
9 MEI Hong1) WANG Qian-Xiang1) ZHANG Lu1) WANG Ji2) 1)(Key Laboratory for High Confidence Software Technologies of Ministry of Education,School of Electronics Engineering and Computer Science,Peking University,Beijing 100871)2)(National Laboratory for Parallel and Distributed Processing,School of Computer Science,National University of Defense Technology,Changsha 410073);Software Analysis:A Road Map[J];Chinese Journal of Computers;2009-09
10 ZHAO Bo1),2)ZHANG Huan-Guo1),2)LI Jing1),2)CHEN Lu1),2)WEN Song1),2)1)(School of Computer,Wuhan University,Wuhan 430079)2)(Key Laboratory of Aerospace Information Security and Trusted Computing of Ministry of Education,Wuhan University,Wuhan430079);The System Architecture and Security Structure of Trusted PDA[J];Chinese Journal of Computers;2010-01
©2006 Tsinghua Tongfang Knowledge Network Technology Co., Ltd.(Beijing)(TTKN) All rights reserved