메뉴 건너뛰기




Volumn 44, Issue 11, 2007, Pages 1889-1895

Transitive trust and performance analysis in windows environment

Author keywords

Information security; Malicious code resistance; Security performance; Transitive trust; Trusted computing

Indexed keywords

COST EFFECTIVENESS; ELECTRIC RESISTANCE; PRODUCTIVITY; SECURITY OF DATA; VERIFICATION;

EID: 37449001498     PISSN: 10001239     EISSN: None     Source Type: Journal    
DOI: 10.1360/crad20071111     Document Type: Article
Times cited : (13)

References (12)
  • 1
    • 37449012577 scopus 로고    scopus 로고
    • Building an. active and comprehensive information security system
    • in Chinese
    • Shen Changxiang. Building an. active and comprehensive information security system[J]. China Information Security, 2004, 41(5): 18-20 (in Chinese)
    • (2004) China Information Security , vol.41 , Issue.5 , pp. 18-20
    • Shen, C.1
  • 5
    • 85084162270 scopus 로고    scopus 로고
    • Design and implementation of a TCG-based integrity measurement architecture
    • San Diego
    • Reiner Sailer, Xiaolan Zhang, Trent Jaeger, et al. Design and implementation of a TCG-based integrity measurement architecture[C]. The 13th Usenix Security Symposium, San Diego, 2004
    • (2004) The 13th Usenix Security Symposium
    • Sailer, R.1    Zhang, X.2    Jaeger, T.3
  • 6
    • 37449033142 scopus 로고    scopus 로고
    • Linux with TCPA integrity measurement
    • IBM, Tech Rep: RT0575
    • Hiroshi Maruyama, Taiga Nakamura, Seiji Munetoh, et al. Linux with TCPA integrity measurement[R]. IBM, Tech Rep: RT0575, 2003
    • (2003)
    • Maruyama, H.1    Nakamura, T.2    Munetoh, S.3
  • 7
    • 34249984223 scopus 로고    scopus 로고
    • A trusted bootstrap scenario based trusted server
    • in Chinese
    • Huang Tao, Shen Changxiang. A trusted bootstrap scenario based trusted server[J]. Journal of Wuhan University (Nature Science), 2004, 50(S1): 12-14 (in Chinese)
    • (2004) Journal of Wuhan University (Nature Science) , vol.50 , Issue.S1 , pp. 12-14
    • Huang, T.1    Shen, C.2
  • 8
    • 34250018220 scopus 로고    scopus 로고
    • The trust model and its analysis in TDDSS
    • in Chinese
    • Tian Junfeng, Xiao Bing, Ma Xiaoxue, et al. The trust model and its analysis in TDDSS[J]. Journal of Computer Research and Development, 2007, 44(4): 598-605 (in Chinese)
    • (2007) Journal of Computer Research and Development , vol.44 , Issue.4 , pp. 598-605
    • Tian, J.1    Xiao, B.2    Ma, X.3
  • 9
    • 21644486314 scopus 로고    scopus 로고
    • TCG specification architecture overview, version 1.2
    • TCG
    • TCG. TCG Specification Architecture Overview, Version 1.2[OL]. https://www.trustedcomputinggroup.org, 2004-04-28
    • (2004)
  • 10
    • 29244467774 scopus 로고    scopus 로고
    • TCG PC specification implementation specification, version 1.1
    • TCG
    • TCG. TCG PC Specification Implementation Specification, Version 1.1[OL]. https://www.trustedcomputinggroup.org, 2003-08-18
    • (2003)
  • 11
    • 37449002098 scopus 로고    scopus 로고
    • 2005 annual report by CNCERT/CC
    • CNCERT/CC, in Chinese
    • CNCERT/CC. 2005 Annual Report by CNCERT/CC[OL]. http://www.cncert.org.cn/upload/ 2005CNCERTCCAnnual-Report_Chinese.pdf, 2006-02-17 (in Chinese)
    • (2006)
  • 12
    • 0038043216 scopus 로고    scopus 로고
    • Security performance
    • Daniel A Menasce. Security performance[J]. IEEE Internet Computing, 2003, 7(3): 84-87
    • (2003) IEEE Internet Computing , vol.7 , Issue.3 , pp. 84-87
    • Menasce, D.A.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.