메뉴 건너뛰기




Volumn 53, Issue 3, 2010, Pages 434-453

Research on theory and key technology of trusted computing platform security testing and evaluation

Author keywords

Information security; Testing and evaluation; Trusted computing; Trusted computing platform

Indexed keywords


EID: 77952314840     PISSN: 10092757     EISSN: 18622836     Source Type: Journal    
DOI: 10.1007/s11432-010-0062-4     Document Type: Article
Times cited : (13)

References (39)
  • 5
    • 46449126152 scopus 로고    scopus 로고
    • Development of trusted computing research
    • Zhang H, Luo J, Jin G, et al. Development of trusted computing research (in Chinese). J Wuhan Univ (Nat Sci Ed), 2006, 52: 513-518.
    • (2006) J Wuhan Univ (Nat Sci Ed) , vol.52 , pp. 513-518
    • Zhang, H.1    Luo, J.2    Jin, G.3
  • 7
    • 65349130418 scopus 로고    scopus 로고
    • Ten years' exploration for test, evaluation and certification of information security
    • Wu S. Ten years' exploration for test, evaluation and certification of information security (in Chinese). Inf Secur Comm Priv, 2007, 6: 5-8.
    • (2007) Inf Secur Comm Priv , vol.6 , pp. 5-8
    • Wu, S.1
  • 8
    • 71949106152 scopus 로고    scopus 로고
    • Automated testing of the trusted platform module
    • Zhan J, Zhang H. Automated testing of the trusted platform module (in Chinese). J Comp Res Develop, 2009, 48: 1839-1846.
    • (2009) J Comp Res Develop , vol.48 , pp. 1839-1846
    • Zhan, J.1    Zhang, H.2
  • 10
    • 65349097321 scopus 로고    scopus 로고
    • Research on compliant testing method of trusted cryptography module
    • Li H, Hu H, Chen X. Research on compliant testing method of trusted cryptography module (in Chinese). J Comput, 2009, 32: 654-663.
    • (2009) J Comput , vol.32 , pp. 654-663
    • Li, H.1    Hu, H.2    Chen, X.3
  • 11
    • 77952302665 scopus 로고    scopus 로고
    • An approach for compliance validation of TPM through applications
    • Cui Q, Shi W. An approach for compliance validation of TPM through applications. J Graduate School Chinese Acad Sci. 2008, 25: 649-656.
    • (2008) J Graduate School Chinese Acad Sci. , vol.25 , pp. 649-656
    • Cui, Q.1    Shi, W.2
  • 12
    • 70449640065 scopus 로고    scopus 로고
    • A logic of secure systems and its application to trusted computing
    • C. S. Pandey (Ed.), Oakland: IEEE Computer Society Press
    • Anupam D, Jason F, Deepak G, et al. A logic of secure systems and its application to trusted computing. In: Pandey C S, ed. 30th IEEE Symposium on Security & Privacy. Oakland: IEEE Computer Society Press, 2009. 221-236.
    • (2009) 30th IEEE Symposium on Security & Privacy , pp. 221-236
    • Anupam, D.1    Jason, F.2    Deepak, G.3
  • 13
    • 65349106488 scopus 로고    scopus 로고
    • Testing on trust chain of trusted computing platform based on labeled transition system
    • Xu M, Zhang H, Yan F. Testing on trust chain of trusted computing platform based on labeled transition system (in Chinese). J Comput, 2009, 32: 635-645.
    • (2009) J Comput , vol.32 , pp. 635-645
    • Xu, M.1    Zhang, H.2    Yan, F.3
  • 14
    • 34547208096 scopus 로고    scopus 로고
    • TCG inside?-a note on TPM specification compliance
    • C. Mitchell (Ed.), New York: Association for Computing Machinery
    • Sadeghi A, Selhorst M, Stueble C, et al. TCG inside?-a note on TPM specification compliance. In: Mitchell C, ed. The First ACM Workshop on Scalable Trusted Computing. New York: Association for Computing Machinery, 2006. 47-56.
    • (2006) The First ACM Workshop on Scalable Trusted Computing , pp. 47-56
    • Sadeghi, A.1    Selhorst, M.2    Stueble, C.3
  • 15
    • 37149032670 scopus 로고    scopus 로고
    • Automated analysis of security APIs
    • Cambridge: Massachusetts Institute of Technology
    • Lin A H. Automated analysis of security APIs. Master Thesis. Cambridge: Massachusetts Institute of Technology, 2005.
    • (2005) Master Thesis
    • Lin, A.H.1
  • 17
    • 77952309839 scopus 로고    scopus 로고
    • Research on cryptology mechanism of trusted computing platform module
    • Luo J, Yan F, Yu F, et al. Research on cryptology mechanism of trusted computing platform module (in Chinese). J Comput Appl, 2008, 28: 1907-1915.
    • (2008) J Comput Appl , vol.28 , pp. 1907-1915
    • Luo, J.1    Yan, F.2    Yu, F.3
  • 18
    • 65349160852 scopus 로고    scopus 로고
    • The formal analysis and testing of trusted platform module
    • Chen X. The formal analysis and testing of trusted platform module (in Chinese). J Comput, 2009, 32: 646-653.
    • (2009) J Comput , vol.32 , pp. 646-653
    • Chen, X.1
  • 19
    • 77952317753 scopus 로고    scopus 로고
    • Compliant testing method of trusted cryptography module
    • Li H, Feng D. Compliant testing method of trusted cryptography module (in Chinese). J Wuhan Univ (Nat Sci Ed), 2009, 55: 31-34.
    • (2009) J Wuhan Univ (Nat Sci Ed) , vol.55 , pp. 31-34
    • Li, H.1    Feng, D.2
  • 20
    • 65249105368 scopus 로고    scopus 로고
    • Case study: Automated security testing on the trusted computing platform
    • C. Mitchell (Ed.), New York: Association for Computing Machinery
    • Gergely T, Koszegi G, Hornák Z. Case study: automated security testing on the trusted computing platform. In: Mitchell C, ed. Proceedings of the 1st ACM SIGOPS European Workshop on System Security, New York: Association for Computing Machinery, 2008. 35-39.
    • (2008) Proceedings of the 1st ACM SIGOPS European Workshop on System Security , pp. 35-39
    • Gergely, T.1    Koszegi, G.2    Hornák, Z.3
  • 24
    • 84988393004 scopus 로고    scopus 로고
    • Classification of security properties (Part I: Information flow)
    • R. Focardi and R. Gorrieri (Eds.), Franconia: Springer-Verlag
    • Focardi R, Gorrieri R. Classification of security properties (Part I: information flow). In: Focardi R, Gorrieri R, eds. Foundations of Security Analysis and Design-Tutorial Lectures, LNCS, Vo1. 2171. Franconia: Springer-Verlag, 2001. 331-396.
    • (2001) Foundations of Security Analysis and Design-Tutorial Lectures, LNCS , pp. 331-396
    • Focardi, R.1    Gorrieri, R.2
  • 25
    • 77952301475 scopus 로고    scopus 로고
    • Non-interference models in computer security
    • Zhou W, Yin Q, Guo J. Non-interference models in computer security (in Chinese). Comput Sci, 2005, 32: 159-165.
    • (2005) Comput Sci , vol.32 , pp. 159-165
    • Zhou, W.1    Yin, Q.2    Guo, J.3
  • 27
    • 27544477855 scopus 로고    scopus 로고
    • BIND: A fine-grained attestation service for secure distributed systems
    • C. S. Pandey (Ed.), Oakland: IEEE Computer Society Press
    • Shi E, Perrig A, Doorn L V. BIND: A fine-grained attestation service for secure distributed systems. In: Pandey C S, ed. 24th IEEE Symposium on Security and Privacy. Oakland: IEEE Computer Society Press, 2005. 154-168.
    • (2005) 24th IEEE Symposium on Security and Privacy , pp. 154-168
    • Shi, E.1    Perrig, A.2    Doorn, L.V.3
  • 32
    • 77953987366 scopus 로고    scopus 로고
    • Random testing: From the classical approach to a global view and full test automation
    • E. Wong (Ed.), New York: Association for Computing Machinery
    • Rainer G, Ralf G, Thomas B. Random testing: from the classical approach to a global view and full test automation. In: Wong E, ed. Proceedings of the Second International Workshop on Random Testing. New York: Association for Computing Machinery, 2007. 30-37.
    • (2007) Proceedings of the Second International Workshop on Random Testing , pp. 30-37
    • Rainer, G.1    Ralf, G.2    Thomas, B.3
  • 35
    • 4444334164 scopus 로고    scopus 로고
    • JCrasher: An automatic robustness tester for Java
    • Csallner C, Smaragdakis Y. JCrasher: an automatic robustness tester for Java. Softw: Pract Exp, 2004, 34: 1025-1050.
    • (2004) Softw: Pract Exp , vol.34 , pp. 1025-1050
    • Csallner, C.1    Smaragdakis, Y.2
  • 39
    • 34250346420 scopus 로고    scopus 로고
    • Daonity: Grid security with behaviour conformity from trusted computing
    • C. Mitchell (Ed.), New York: Association for Computing Machinery
    • Mao W, Yan F, Chen C. Daonity: grid security with behaviour conformity from trusted computing. In: Mitchell C, eds. The First ACM Workshop on Scalable Trusted Computing. New York: Association for Computing Machinery, 2006. 43-46.
    • (2006) The First ACM Workshop on Scalable Trusted Computing , pp. 43-46
    • Mao, W.1    Yan, F.2    Chen, C.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.