最后,探讨了可信计算的发展趋势。
Some future research directions of dependable computing were presented.
可信执行环境与可信计算基础之比较。
计算平台状态可信证明是可信计算研究的热点问题。
Trustworthiness attestation of computing platform is a focus research work in Trusted computing.
最后,提出了我国可信计算标准路线图制定的建议。
Finally, we suggest a roadmap of trusted computing standard specifications.
本文首先研究现有的可信计算平台的密钥管理机制;
First, the paper studies the key management mechanisms of the existing Trusted Computing Platform;
可信计算充分吸收了这种理念,并将其运用到计算机世界当中。
Trusted computing fully absorbed this idea, and was applied to a computer in the world.
最后,我们主要到可信计算处理器已经成为一门广为批评的话题。
Finally we note that trusted computing has been the subject of a considerable amount of criticism.
匿名认证是可信计算平台的重要功能,旨在解决个人隐私的保密问题。
Anonymity authentication is an important function of trusted computing platform, and it is used to deal with an issue of personal privacy.
介绍了可信计算的基本思想和体系结构,分析了可信计算原理和技术。
This paper introduces the main idea and architecture of trusted computing, analyses its principles and technologies.
安全模型既是可信信息系统的核心内容,也是可信计算研究的重要领域。
The security model is the core content in the trusted information system and the key field of the trusted computing research.
可信计算通过在软件和硬件上增加一些组件来增加计算机系统的可信赖性。
Trusted computing enhances computer systems'security by adding some module on both software and hardware.
自愈调控是构建可信计算机系统的必要手段,也是系统高可用性的重要保证。
Self-healing scheduling technique is critical for dependability of computer systems and also a guarantee of high availability.
在可信计算平台的维护过程中,需要保证保护数据的完整性,安全性和可用性。
In the maintenance process on the trusted computing platform, the integrity, security and usability of the protected data must be ensured.
本文讨论了一个智能电网系统的关键安全技术问题,包括公钥基础设施和可信计算。
This paper discusses key security technologies for a smart grid system, including public key infrastructures and trusted computing.
将可信计算技术应用到嵌入式系统中,是一条有效解决嵌入式设备安全问题的新思路。
The problems faced in applying computer simulation technology to the scheduling and rescheduling are discussed.
可信计算平台作为解决信息安全隐患的计算机软硬件实体,引起了人们越来越多的关注。
Trusted computing platform is a computer soft hardware entity to solve the hidden trouble of information security, which makes people pay more and more attention to it.
在本论文中,我们提出了将可信计算与电子支付结合起来,实现安全电子支付终端的方案。
By using trusted computing theory, we build a credible hardware and operating system environment at payment terminal, and then we extends the credibility to the electronic payment system.
授权数据是由那些属于系统中可信计算基础的服务器颁发的,因此在它所管理的域中可以认为是安全的。
The authorization data is issued by a server that belongs to the trusted computing base of the system and is considered secure in its administrative domain.
可信计算的基本思路是:首先构建一个信任根,信任根的可信性由物理安全和管理安全确保。
The basic consider of the trusted compute is: at first structuring a trust root, the credibility of which is guaranteed by the physics security and management security.
基于863项目“可信计算系统平台”的安全芯片研制成功,展现了可信计算的良好应用前景。
The successful application of "a trusted computing platform System" funded by 863 Projects indicates that future of the trusted computing platform will be promising.
远程认证是可信计算平台的一种重要功能,二进制方法和基于属性证书的认证是其两种认证方法。
Remote attestation is one ofthe important functionalities oftmsted computing. Binary attestation and property-based attestation are two methods of authentication.
随着信息技术的飞速发展,可信计算机在安全方面的优越性越来越受到国内外计算机领域工作者的重视。
With the development of information technology, the advantage of trusted computer in security is much accounted of The Trusted platform module is the core of Trusted Computing PC.
可信计算是在计算和通信系统中广泛使用基于硬件安全模块支持下的可信计算平台,以提高整体的安全性。
The trusted computing based on the hardware security module supporting is the platform to enhance the whole security broadly used in the computation and the communications system.
同时,能够阻止病毒程序、恶意代码程序的运行,这样可信计算平台解决了加密系统及其运行环境的安全性问题。
In the same time, Trusted Computing platform can prevent the run of virus program and malicious code. This platform also solves the security problem of encrypt system and run environment.
基于TPM的安全优盘系统使用可信计算平台模块TPM实现密钥的存储和管理,解决了密码技术中密钥管理的难题。
TPM based security USB disk system uses the Trusted Computing Platform Module TPM to store and use the key to solve the password management problems.
本文的研究成果不仅为安全操作系统的研究提供了支撑,还为基于可信计算的安全技术的研究方向提供了一定的借鉴。
The researches proposed by this thesis can not only support the secure OS research but also be used a reference of trusted computing-based work.
可信计算基础只是一个安装时选项,并且若要在现有的AIX计算机上启用TCB,您需要重新安装整个AIX操作系统。
Trusted Computing Base is an install-time option only and to enable TCB on an existing AIX machine, you need to reinstall the entire AIX operating system.
针对这一应用背景,本文主要探讨利用可信计算达到系统运行可信目标,研究保障系统安全运行的可信平台的模型和体系结构。
To meet this security requirement, this paper mainly discusses the trusted Computing technology and proposes a trusted platform model and architecture to guarantee the s is running under expectations.
针对这一应用背景,本文主要探讨利用可信计算达到系统运行可信目标,研究保障系统安全运行的可信平台的模型和体系结构。
To meet this security requirement, this paper mainly discusses the trusted Computing technology and proposes a trusted platform model and architecture to guarantee the s is running under expectations.
应用推荐