Development of trusted computing research

EDP Sciences - Tập 11 - Trang 1407-1413 - 2006
Zhang Huanguo1,2, Luo Jie1, Jin Gang1, Zhu Zhiqiang1, Yu Fajiang1, Yan Fei1
1School of Computer, Wuhan University, Wuhan, Hubei, China
2State Key Laboratory of Software Engineering, Wuhan University, Wuhan, Hubei, China

Tóm tắt

Trusted computing is the new trend of information security today. This paper surveys the theory and technology of trusted computing. The development history of trusted computing, and the development of trusted computing in China are introduced in this paper, and then it analyzes some problems of trusted computing at present which are delay in theory research, some key technologies to be developed and lack of trusted software system. Some fields are worthy to be explored on are pointed out including key technology, basic theory and application in trusted computing.

Tài liệu tham khảo

Department of Defense Computer Security Center. DoD 5200. 28-STD. Department of Defense Trusted Computer System Evaluation Criteria [S/OL]. [2006-01-16].http://www.fas.org/jrp/asa/rainboa. Trusted Computing Group. TCG Specification Architecture Overview [EB/OL]. [2005-03-01].https://www. trustedcomputinggroup.org/groups/TCG_1_0_Architecture_Overview.pdf. Intel Corporation. LaGrande Technology Architectural Overview [EB/OL]. [2005-01-13].http://www.intel.com/technology/ security/. Microsoft. Trusted Platform Module Services in Windows Longhom [EB/OL]. [2005-4-25].http://www. microso ft. com/resources/ngsch/. Patel J, Teacy W, Luke T,et al. A Probabilistic Trust Model for Handling Inaccurate Reputation Sources [C]Trast Management, Third International Conference, i Trust 2005. Berlin Heidelberg: Springer, 2005:193–209. Beth T, Borcherding M, Klein B. Valuation of Trust in Open Network [C]//Proc of the European Symposium on Research in Security (ESORICS). Brighton: Springer-Verlag, 1994:3–18. Tang Wen, Chen Zhong. Research of Subjective Trust Management Model Based on the Fuzzy Set Theory [I].Journal of Sofware, 2003,14(8):1401–1408 (Ch). Jøsang Audun. An Algebra for Assessing Trust in Certification Chains [C]//Proc of NDSS99, Network and Distributed System Security Symposium, San Diego, California, USA, February, 1999. Qu Yanwen.Software Behavior [M]. Beijing: The Electronic Industry Press, 2004 (Ch). Pearson S.Trusted Computing Plat form, the Next Security Solution [R]. Bristol UK: HP Laboratories, 2002. Avizienis A, Laprie J C, Randell B,et al. Basic Concepts and Taxonomy of Dependable and Secure computing [J].IEEE Transaction on Dependable and Secure Computing, 2004,1 (1):11–33. Trusted Computing Group. TPM Software Stack (TSS) Specifications[EB/OL]. [2005-12-1]https://www.trustedcomputing group.org/specs/TSS/. Trusted Computing Group. Trusted Network Connect Specification [EB/OL]. 2005-3-13].https://www.trustedcomputinggroup.org/groups/network/. National Computer Security Center. NCSC-TG-021. Trusted Database Management System Interpretation [S]. Washington: US DOD, April 1991. National Computer Security Center. NCSC-TG-005. Trusted Network Interpretation of the Trusted Computer System Evaluation Criteria [S]. Washington: US DOD, July 1987. The Open Trusted Computing (Open TC) consortium. General activities of Open TC [EB/OL]. [2006-01-16].http://www.opentc. net/activities/. Zhang Huanguo, Wu Guoqing, Qin Zhongpinget al. A New 7Type of Trusted Computer [J].Journal of Wuhan University (Natural Science). 2004,50(S1):1–6 (Ch.) Zhang Huanguo, Liu Yuzhen, Yu Fajiang,et al. A New Type of Embedded Security Module [J].Journal of Wuhan University (Natural Science). 2004,50(S1):7–11 (Ch). Lin Chuang, Peng Xuehai. Trusted Network Research [J].The Chinese Journal of Computers, 2005,28 (5):751–758 (Ch). Daonity Team. Daonity Specifications Part I Design [EB/OL]. [2006-01-13]https://forge.gridforum.org/projects/torg. Chen Huowang, Wang Ji, Dong Wei. The High Trusted Software Engineer Technology [J].The Chinese Journal of Electronics, 2003,31(12A):1933–1938 (Ch).