Wuhan University Journal of Natural Sciences

, Volume 11, Issue 6, pp 1407–1413 | Cite as

Development of trusted computing research

  • Zhang Huanguo
  • Luo Jie
  • Jin Gang
  • Zhu Zhiqiang
  • Yu Fajiang
  • Yan Fei
Survey

Abstract

Trusted computing is the new trend of information security today. This paper surveys the theory and technology of trusted computing. The development history of trusted computing, and the development of trusted computing in China are introduced in this paper, and then it analyzes some problems of trusted computing at present which are delay in theory research, some key technologies to be developed and lack of trusted software system. Some fields are worthy to be explored on are pointed out including key technology, basic theory and application in trusted computing.

Key words

computer trusted computing secure computer information security 

CLC number

TP 309 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. [1]
    Department of Defense Computer Security Center. DoD 5200. 28-STD. Department of Defense Trusted Computer System Evaluation Criteria [S/OL]. [2006-01-16].http://www.fas.org/jrp/asa/rainboa.Google Scholar
  2. [2]
    Trusted Computing Group. TCG Specification Architecture Overview [EB/OL]. [2005-03-01].https://www. trustedcomputinggroup.org/groups/TCG_1_0_Architecture_Overview.pdf.Google Scholar
  3. [3]
    Intel Corporation. LaGrande Technology Architectural Overview [EB/OL]. [2005-01-13].http://www.intel.com/technology/ security/.Google Scholar
  4. [4]
    Microsoft. Trusted Platform Module Services in Windows Longhom [EB/OL]. [2005-4-25].http://www. microso ft. com/resources/ngsch/.Google Scholar
  5. [5]
    Patel J, Teacy W, Luke T,et al. A Probabilistic Trust Model for Handling Inaccurate Reputation Sources [C]Trast Management, Third International Conference, i Trust 2005. Berlin Heidelberg: Springer, 2005:193–209.Google Scholar
  6. [6]
    Beth T, Borcherding M, Klein B. Valuation of Trust in Open Network [C]//Proc of the European Symposium on Research in Security (ESORICS). Brighton: Springer-Verlag, 1994:3–18.Google Scholar
  7. [7]
    Tang Wen, Chen Zhong. Research of Subjective Trust Management Model Based on the Fuzzy Set Theory [I].Journal of Sofware, 2003,14(8):1401–1408 (Ch).MATHGoogle Scholar
  8. [8]
    Jøsang Audun. An Algebra for Assessing Trust in Certification Chains [C]//Proc of NDSS99, Network and Distributed System Security Symposium, San Diego, California, USA, February, 1999.Google Scholar
  9. [9]
    Qu Yanwen.Software Behavior [M]. Beijing: The Electronic Industry Press, 2004 (Ch).Google Scholar
  10. [10]
    Pearson S.Trusted Computing Plat form, the Next Security Solution [R]. Bristol UK: HP Laboratories, 2002.Google Scholar
  11. [11]
    Avizienis A, Laprie J C, Randell B,et al. Basic Concepts and Taxonomy of Dependable and Secure computing [J].IEEE Transaction on Dependable and Secure Computing, 2004,1 (1):11–33.CrossRefGoogle Scholar
  12. [12]
    Trusted Computing Group. TPM Software Stack (TSS) Specifications[EB/OL]. [2005-12-1]https://www.trustedcomputing group.org/specs/TSS/.Google Scholar
  13. [13]
    Trusted Computing Group. Trusted Network Connect Specification [EB/OL]. 2005-3-13].https://www.trustedcomputinggroup.org/groups/network/.Google Scholar
  14. [14]
    National Computer Security Center. NCSC-TG-021. Trusted Database Management System Interpretation [S]. Washington: US DOD, April 1991.Google Scholar
  15. [15]
    National Computer Security Center. NCSC-TG-005. Trusted Network Interpretation of the Trusted Computer System Evaluation Criteria [S]. Washington: US DOD, July 1987.Google Scholar
  16. [16]
    The Open Trusted Computing (Open TC) consortium. General activities of Open TC [EB/OL]. [2006-01-16].http://www.opentc. net/activities/.Google Scholar
  17. [17]
    Zhang Huanguo, Wu Guoqing, Qin Zhongpinget al. A New 7Type of Trusted Computer [J].Journal of Wuhan University (Natural Science). 2004,50(S1):1–6 (Ch.)MathSciNetGoogle Scholar
  18. [18]
    Zhang Huanguo, Liu Yuzhen, Yu Fajiang,et al. A New Type of Embedded Security Module [J].Journal of Wuhan University (Natural Science). 2004,50(S1):7–11 (Ch).CrossRefGoogle Scholar
  19. [19]
    Lin Chuang, Peng Xuehai. Trusted Network Research [J].The Chinese Journal of Computers, 2005,28 (5):751–758 (Ch).Google Scholar
  20. [20]
    Daonity Team. Daonity Specifications Part I Design [EB/OL]. [2006-01-13]https://forge.gridforum.org/projects/torg.Google Scholar
  21. [21]
    Chen Huowang, Wang Ji, Dong Wei. The High Trusted Software Engineer Technology [J].The Chinese Journal of Electronics, 2003,31(12A):1933–1938 (Ch).Google Scholar

Copyright information

© Springer 2006

Authors and Affiliations

  • Zhang Huanguo
    • 1
    • 2
  • Luo Jie
    • 1
  • Jin Gang
    • 1
  • Zhu Zhiqiang
    • 1
  • Yu Fajiang
    • 1
  • Yan Fei
    • 1
  1. 1.School of ComputerWuhan UniversityWuhan, HubeiChina
  2. 2.State Key Laboratory of Software EngineeringWuhan UniversityWuhan, HubeiChina

Personalised recommendations