메뉴 건너뛰기




Volumn 33, Issue 4, 2010, Pages 706-717

Research on trusted network connection

Author keywords

Information security; Network security; Trusted computing; Trusted network; Trusted network connection

Indexed keywords

DEVELOPMENT HISTORY; INFORMATION FLOWS; INFORMATION SECURITY; RESEARCH TRENDS; TRUSTED COMPUTING; TRUSTED NETWORK;

EID: 77952296573     PISSN: 02544164     EISSN: None     Source Type: Journal    
DOI: 10.3724/SP.J.1016.2010.00706     Document Type: Article
Times cited : (45)

References (29)
  • 1
    • 77952589490 scopus 로고
    • Department of Defense Computer Security Center. DoD 5200.28-STD. Department of Defense Trusted Computer System Evaluation Criteria. USA: DOD, December
    • Department of Defense Computer Security Center. DoD 5200.28-STD. Department of Defense Trusted Computer System Evaluation Criteria. USA: DOD, December 1985
    • (1985)
  • 4
    • 20444411497 scopus 로고    scopus 로고
    • Research on trustworthy networks
    • in Chinese
    • Lin Chuang, Peng Xue-Hai. Research on trustworthy networks. Chinese Journal of Computers, 2005, 28(5): 751-758(in Chinese)
    • (2005) Chinese Journal of Computers , vol.28 , Issue.5 , pp. 751-758
    • Lin, C.1    Peng, X.-H.2
  • 5
    • 12844277127 scopus 로고    scopus 로고
    • The new controllable and extensible generation internet
    • in Chinese
    • Lin Chuang, Ren Feng-Yuan. The new controllable and extensible generation internet. Journal of Software, 2004, 15(12): 1815-1821(in Chinese)
    • (2004) Journal of Software , vol.15 , Issue.12 , pp. 1815-1821
    • Lin, C.1    Ren, F.-Y.2
  • 6
    • 48049110932 scopus 로고    scopus 로고
    • Trusted system and network
    • in Chinese
    • Min Ying-Hua. Trusted system and network. Computer Engineering & Science, 2001, 23(5): 21-23(in Chinese)
    • (2001) Computer Engineering & Science , vol.23 , Issue.5 , pp. 21-23
    • Min, Y.-H.1
  • 7
    • 37348999613 scopus 로고    scopus 로고
    • A kind of game-theoretic control mechanism of user behavior trust based on prediction in trustworthy network
    • in Chinese
    • Tian Li-Qin, Lin Chuang. A kind of game-theoretic control mechanism of user behavior trust based on prediction in trustworthy network. Chinese Journal of Computers, 2007, 30(11): 1930-1938(in Chinese)
    • (2007) Chinese Journal of Computers , vol.30 , Issue.11 , pp. 1930-1938
    • Tian, L.-Q.1    Lin, C.2
  • 19
    • 34250002868 scopus 로고    scopus 로고
    • Beijing: Publishing House of Electronics Industry, (in Chinese)
    • Qu Yan-Wen. Software Behavior. Beijing: Publishing House of Electronics Industry, 2004(in Chinese)
    • (2004) Software Behavior
    • Qu, Y.-W.1
  • 22
    • 30144435491 scopus 로고    scopus 로고
    • Peer-to-peer access control architecture using trusted computing technology
    • Sandhu R, Zhang X. Peer-to-peer access control architecture using trusted computing technology//Proceedings of the SACMAT05, 2005: 147-158
    • (2005) Proceedings of the SACMAT05 , pp. 147-158
    • Sandhu, R.1    Zhang, X.2
  • 24
    • 77952310903 scopus 로고    scopus 로고
    • Some theories and key technologies of trusted network connection
    • Wuhan University, Wuhan, (in Chinese)
    • Zhang Li-Qing. Some theories and key technologies of trusted network connection [Ph.D. dissertation]. Wuhan University, Wuhan, 2008(in Chinese)
    • (2008)
    • Zhang, L.-Q.1
  • 25
    • 35148822844 scopus 로고    scopus 로고
    • Trusted code remote execution through trusted computing and virtualization
    • Qingdao
    • Zhang Li-Qiang, Chen Lu, Zhang Huan-Guo, Yan Fei. Trusted code remote execution through trusted computing and virtualization//Proceedings of the SNPD 2007. Qingdao, 2007: 39-44
    • (2007) Proceedings of the SNPD 2007 , pp. 39-44
    • Zhang, L.-Q.1    Chen, L.2    Zhang, H.-G.3    Yan, F.4
  • 27
    • 77952604185 scopus 로고    scopus 로고
    • Research on access control based trusted computing
    • Wuhan University, Wuhan, (in Chinese)
    • Wen Song. Research on access control based trusted computing [Ph.D. dissertation]. Wuhan University, Wuhan, 2009(in Chinese)
    • (2009)
    • Wen, S.1
  • 28
    • 57049177662 scopus 로고    scopus 로고
    • A peer-to-peer resource sharing scheme using trusted computing technology
    • Chen Lu, Zhang Huan-Guo, Zhang Li-Qiang, Li Song, Cai Liang. A peer-to-peer resource sharing scheme using trusted computing technology. Wuhan University of Natural Sciences, 2008, 13(5): 523-527
    • (2008) Wuhan University of Natural Sciences , vol.13 , Issue.5 , pp. 523-527
    • Chen, L.1    Zhang, H.-G.2    Zhang, L.-Q.3    Li, S.4    Cai, L.5
  • 29
    • 77952648048 scopus 로고    scopus 로고
    • A new information measurement scheme based on TPM for trusted network access
    • Chen Lu, Zhang Huan-Guo, Zhang Li-Qiang, Cai Liang. A new information measurement scheme based on TPM for trusted network access//Proceedings of the MEMS 2007. 2007: 574-577
    • (2007) Proceedings of the MEMS 2007 , pp. 574-577
    • Chen, L.1    Zhang, H.-G.2    Zhang, L.-Q.3    Cai, L.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.