-
1
-
-
77952589490
-
-
Department of Defense Computer Security Center. DoD 5200.28-STD. Department of Defense Trusted Computer System Evaluation Criteria. USA: DOD, December
-
Department of Defense Computer Security Center. DoD 5200.28-STD. Department of Defense Trusted Computer System Evaluation Criteria. USA: DOD, December 1985
-
(1985)
-
-
-
4
-
-
20444411497
-
Research on trustworthy networks
-
in Chinese
-
Lin Chuang, Peng Xue-Hai. Research on trustworthy networks. Chinese Journal of Computers, 2005, 28(5): 751-758(in Chinese)
-
(2005)
Chinese Journal of Computers
, vol.28
, Issue.5
, pp. 751-758
-
-
Lin, C.1
Peng, X.-H.2
-
5
-
-
12844277127
-
The new controllable and extensible generation internet
-
in Chinese
-
Lin Chuang, Ren Feng-Yuan. The new controllable and extensible generation internet. Journal of Software, 2004, 15(12): 1815-1821(in Chinese)
-
(2004)
Journal of Software
, vol.15
, Issue.12
, pp. 1815-1821
-
-
Lin, C.1
Ren, F.-Y.2
-
6
-
-
48049110932
-
Trusted system and network
-
in Chinese
-
Min Ying-Hua. Trusted system and network. Computer Engineering & Science, 2001, 23(5): 21-23(in Chinese)
-
(2001)
Computer Engineering & Science
, vol.23
, Issue.5
, pp. 21-23
-
-
Min, Y.-H.1
-
7
-
-
37348999613
-
A kind of game-theoretic control mechanism of user behavior trust based on prediction in trustworthy network
-
in Chinese
-
Tian Li-Qin, Lin Chuang. A kind of game-theoretic control mechanism of user behavior trust based on prediction in trustworthy network. Chinese Journal of Computers, 2007, 30(11): 1930-1938(in Chinese)
-
(2007)
Chinese Journal of Computers
, vol.30
, Issue.11
, pp. 1930-1938
-
-
Tian, L.-Q.1
Lin, C.2
-
9
-
-
34547277604
-
Survey of information security
-
Shen Chang-Xiang, Zhang Huan-Guo, Feng Deng-Guo, Cao Zhen-Fu, Huang Ji-Wu. Survey of information security. Science in Chian Series F, 2007, 50(3): 273-298
-
(2007)
Science in Chian Series F
, vol.50
, Issue.3
, pp. 273-298
-
-
Shen, C.-X.1
Zhang, H.-G.2
Feng, D.-G.3
Cao, Z.-F.4
Huang, J.-W.5
-
11
-
-
79953218276
-
A robust integrity reporting protocol for remote attestation
-
Tokey, Japan
-
Stumpf Frederic, Tagreschi Omid, Roder Patrick, Eckert Claudia. A robust integrity reporting protocol for remote attestation//Proceedings of the 2nd Workshop on Advances in Trusted Computing. Tokey, Japan, 2006
-
(2006)
Proceedings of the 2nd Workshop on Advances in Trusted Computing
-
-
Stumpf, F.1
Tagreschi, O.2
Roder, P.3
Eckert, C.4
-
15
-
-
84885617227
-
Pioneer: Verifying integrity and guaranteeing execution of code on legacy platforms
-
Seshadri A, Luk M, Shi E, Perrig A, van Doorn L, Khosla P. Pioneer: Verifying integrity and guaranteeing execution of code on legacy platforms//Proceedings of the Symposium on Operating System Principles, 2005: 1-16
-
(2005)
Proceedings of the Symposium on Operating System Principles
, pp. 1-16
-
-
Seshadri, A.1
Luk, M.2
Shi, E.3
Perrig, A.4
van Doorn, L.5
Khosla, P.6
-
19
-
-
34250002868
-
-
Beijing: Publishing House of Electronics Industry, (in Chinese)
-
Qu Yan-Wen. Software Behavior. Beijing: Publishing House of Electronics Industry, 2004(in Chinese)
-
(2004)
Software Behavior
-
-
Qu, Y.-W.1
-
20
-
-
34247346997
-
Secure information sharing enabled by trusted computing and PEI models
-
Sandhu R, Ranganathan K, Zhang X. Secure information sharing enabled by trusted computing and PEI models//Proceedings of the ACM Symposium on Information, Computer, and Communication Security, 2006
-
(2006)
Proceedings of the ACM Symposium on Information, Computer, and Communication Security
-
-
Sandhu, R.1
Ranganathan, K.2
Zhang, X.3
-
22
-
-
30144435491
-
Peer-to-peer access control architecture using trusted computing technology
-
Sandhu R, Zhang X. Peer-to-peer access control architecture using trusted computing technology//Proceedings of the SACMAT05, 2005: 147-158
-
(2005)
Proceedings of the SACMAT05
, pp. 147-158
-
-
Sandhu, R.1
Zhang, X.2
-
24
-
-
77952310903
-
Some theories and key technologies of trusted network connection
-
Wuhan University, Wuhan, (in Chinese)
-
Zhang Li-Qing. Some theories and key technologies of trusted network connection [Ph.D. dissertation]. Wuhan University, Wuhan, 2008(in Chinese)
-
(2008)
-
-
Zhang, L.-Q.1
-
25
-
-
35148822844
-
Trusted code remote execution through trusted computing and virtualization
-
Qingdao
-
Zhang Li-Qiang, Chen Lu, Zhang Huan-Guo, Yan Fei. Trusted code remote execution through trusted computing and virtualization//Proceedings of the SNPD 2007. Qingdao, 2007: 39-44
-
(2007)
Proceedings of the SNPD 2007
, pp. 39-44
-
-
Zhang, L.-Q.1
Chen, L.2
Zhang, H.-G.3
Yan, F.4
-
27
-
-
77952604185
-
Research on access control based trusted computing
-
Wuhan University, Wuhan, (in Chinese)
-
Wen Song. Research on access control based trusted computing [Ph.D. dissertation]. Wuhan University, Wuhan, 2009(in Chinese)
-
(2009)
-
-
Wen, S.1
-
28
-
-
57049177662
-
A peer-to-peer resource sharing scheme using trusted computing technology
-
Chen Lu, Zhang Huan-Guo, Zhang Li-Qiang, Li Song, Cai Liang. A peer-to-peer resource sharing scheme using trusted computing technology. Wuhan University of Natural Sciences, 2008, 13(5): 523-527
-
(2008)
Wuhan University of Natural Sciences
, vol.13
, Issue.5
, pp. 523-527
-
-
Chen, L.1
Zhang, H.-G.2
Zhang, L.-Q.3
Li, S.4
Cai, L.5
-
29
-
-
77952648048
-
A new information measurement scheme based on TPM for trusted network access
-
Chen Lu, Zhang Huan-Guo, Zhang Li-Qiang, Cai Liang. A new information measurement scheme based on TPM for trusted network access//Proceedings of the MEMS 2007. 2007: 574-577
-
(2007)
Proceedings of the MEMS 2007
, pp. 574-577
-
-
Chen, L.1
Zhang, H.-G.2
Zhang, L.-Q.3
Cai, L.4
|