Implementation of trusted computing in commercial cryptogram based on hardware 基于硬件系统的商用密码可信计算实现方法
So the trusted computing environment can be investigated by extend forensic services and improved workflow 从可信计算和数字取证技术角度,分析了该模型的取证能力指标。
Trusted computing platform only performs the program that is assured by trusted root , and ensures the running program is legal 可信计算平台只执行被信任根源担保的程序,并保证运行的程序都是合法的。
For solving above problems , this paper presents a new security protocol based on trusted computing platform 本文根据可信计算平台和安全协议的研究现状,针对目前安全协议的不足,提出了基于可信计算平台的安全通信协议。
This paper presents an extended trusted computing and forensics model in order to efficiently investigate the environment based on trusted computing technique 摘要为了进行可信计算环境中的数字取证调查,提出了一个可信计算取证模型。
The authorization data is issued by a server that belongs to the trusted computing base of the system and is considered secure in its administrative domain 授权数据是由那些属于系统中可信计算基础的服务器颁发的,因此在它所管理的域中可以认为是安全的。
In the end of the lecture , mr . zhang also introduced to us the four research points this year : operating system , game figures , embedded system and authentic calculation 讲座最后,张老师还为我们介绍了微软今年的四大研究重点:操作系统,游戏图形,嵌入式系统,可信计算。
The extended trusted computing and forensic services are used in collecting and analysis activity , including forensic sealing , forensic authentication , key recovery and distributed forensic services 利用可信计算取证服务和改进的分析流程能够有效解决可信计算环境中的数字取证调查问题。
In the same time , trusted computing platform can prevent the run of virus program and malicious code . this platform also solves the security problem of encrypt system and run environment 同时,能够阻止病毒程序、恶意代码程序的运行,这样可信计算平台解决了加密系统及其运行环境的安全性问题。
Also part of the trusted computing base of the distributed system , and they flow together on the wire whenever a client is required to gain access to a particular object 产生并颁发的,它也是分布式系统中可信计算基础的一部分)中,每当客户机被要求获得对某个特定对象的访问权限时,它们就会一起在线路上传输。