• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Feng Dengguo, Qin Yu, Wang Dan, and Chu Xiaobo. Research on Trusted Computing Technology[J]. Journal of Computer Research and Development, 2011, 48(8): 1332-1349.
Citation: Feng Dengguo, Qin Yu, Wang Dan, and Chu Xiaobo. Research on Trusted Computing Technology[J]. Journal of Computer Research and Development, 2011, 48(8): 1332-1349.

Research on Trusted Computing Technology

More Information
  • Published Date: August 14, 2011
  • Trusted computing, as a novel technology of information security, has become an important research area of information security. TCG comprised of the international IT giants has published a series of trusted computing specifications to promote the comprehensive development of the trusted computing technology and industry, and the core specifications have been accepted as international standardization by ISO/IEC. In academia, the research institutions at home and abroad study the trusted computing technology in depth and have gained rich achievements. In China, the independent trusted computing standard infrastructure is founded with the core of TCM on the basis of the independent cryptography algorithms, forming the whole trusted computing industry chains, which breaks the monopolization of the trusted computing technology and industry by the international IT giants. With the rapid development of trusted computing field, there are still lots of problems on the key technologies to be solved, and the related research has been done in succession recently. This paper comprehensively illustrates our research results on trusted computing technology. Beginning with establishing the trust of the terminal platforms, we propose a trustworthiness-based trust model and give a method of building trust chain dynamically with information flow, which ensure the real time and security protection of the trust establishment to some extent. Aiming at the security and efficiency problems of the remote attestation protocols, we propose the first property-based attestation scheme on bilinear map and the first direct anonymous attestation scheme based on the q-SDH assumption from the bilinear maps. In trusted computing testing and evaluation, we propose a method of generating test cases automatically with EFSM, and from the method develop a trusted computing platform testing and evaluation system which is the first to be applied in China practically.
  • Related Articles

    [1]Guo Husheng, Zhang Yang, Wang Wenjian. Two-Stage Adaptive Ensemble Learning Method for Different Types of Concept Drift[J]. Journal of Computer Research and Development, 2024, 61(7): 1799-1811. DOI: 10.7544/issn1000-1239.202330452
    [2]Yuan Zhong, Chen Hongmei, Wang Zhihong, Li Tianrui. Exploiting Hybrid Kernel-Based Fuzzy Complementary Mutual Information for Selecting Features[J]. Journal of Computer Research and Development, 2023, 60(5): 1111-1120. DOI: 10.7544/issn1000-1239.202111272
    [3]Zhou Yu, He Jianjun, Gu Hong. Fast Kernel-Based Partial Label Learning Algorithm Based on Variational Gaussian Process Model[J]. Journal of Computer Research and Development, 2017, 54(1): 63-70. DOI: 10.7544/issn1000-1239.2017.20150796
    [4]Feng Chang, Liao Shizhong. Model Selection for Gaussian Kernel Support Vector Machines in Random Fourier Feature Space[J]. Journal of Computer Research and Development, 2016, 53(9): 1971-1978. DOI: 10.7544/issn1000-1239.2016.20150489
    [5]Tian Meng, Wang Wenjian. Generalized Kernel Polarization Criterion for Optimizing Gaussian Kernel[J]. Journal of Computer Research and Development, 2015, 52(8): 1722-1734. DOI: 10.7544/issn1000-1239.2015.20150110
    [6]Liu Yong, Jiang Shali, Liao Shizhong. Approximate Gaussian Kernel for Large-Scale SVM[J]. Journal of Computer Research and Development, 2014, 51(10): 2171-2177. DOI: 10.7544/issn1000-1239.2014.20130825
    [7]Shao Zengzhen, Wang Hongguo, Liu Hong, Song Chaochao, Meng Chunhua, Yu Hongling. Heuristic Optimization Algorithms of Multi-Carpooling Problem Based on Two-Stage Clustering[J]. Journal of Computer Research and Development, 2013, 50(11): 2325-2335.
    [8]Chen Yarui and Liao Shizhong. A Normalized Structure Selection Algorithm Based on Coupling for Gaussian Mean Fields[J]. Journal of Computer Research and Development, 2010, 47(9): 1497-1503.
    [9]Qiao Lishan, Chen Songcan, Wang Min. Image Thresholding Based on Relevance Vector Machine[J]. Journal of Computer Research and Development, 2010, 47(8): 1329-1337.
    [10]Liu Xiangdong, Luo Bin, and Chen Zhaoqian. Optimal Model Selection for Support Vector Machines[J]. Journal of Computer Research and Development, 2005, 42(4): 576-581.

Catalog

    Article views (1697) PDF downloads (2626) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return