Skip to main content
Log in

Development of trusted computing research

  • Survey
  • Published:
Wuhan University Journal of Natural Sciences

Abstract

Trusted computing is the new trend of information security today. This paper surveys the theory and technology of trusted computing. The development history of trusted computing, and the development of trusted computing in China are introduced in this paper, and then it analyzes some problems of trusted computing at present which are delay in theory research, some key technologies to be developed and lack of trusted software system. Some fields are worthy to be explored on are pointed out including key technology, basic theory and application in trusted computing.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Department of Defense Computer Security Center. DoD 5200. 28-STD. Department of Defense Trusted Computer System Evaluation Criteria [S/OL]. [2006-01-16].http://www.fas.org/jrp/asa/rainboa.

  2. Trusted Computing Group. TCG Specification Architecture Overview [EB/OL]. [2005-03-01].https://www. trustedcomputinggroup.org/groups/TCG_1_0_Architecture_Overview.pdf.

  3. Intel Corporation. LaGrande Technology Architectural Overview [EB/OL]. [2005-01-13].http://www.intel.com/technology/ security/.

  4. Microsoft. Trusted Platform Module Services in Windows Longhom [EB/OL]. [2005-4-25].http://www. microso ft. com/resources/ngsch/.

  5. Patel J, Teacy W, Luke T,et al. A Probabilistic Trust Model for Handling Inaccurate Reputation Sources [C]Trast Management, Third International Conference, i Trust 2005. Berlin Heidelberg: Springer, 2005:193–209.

    Google Scholar 

  6. Beth T, Borcherding M, Klein B. Valuation of Trust in Open Network [C]//Proc of the European Symposium on Research in Security (ESORICS). Brighton: Springer-Verlag, 1994:3–18.

    Google Scholar 

  7. Tang Wen, Chen Zhong. Research of Subjective Trust Management Model Based on the Fuzzy Set Theory [I].Journal of Sofware, 2003,14(8):1401–1408 (Ch).

    MATH  Google Scholar 

  8. Jøsang Audun. An Algebra for Assessing Trust in Certification Chains [C]//Proc of NDSS99, Network and Distributed System Security Symposium, San Diego, California, USA, February, 1999.

  9. Qu Yanwen.Software Behavior [M]. Beijing: The Electronic Industry Press, 2004 (Ch).

    Google Scholar 

  10. Pearson S.Trusted Computing Plat form, the Next Security Solution [R]. Bristol UK: HP Laboratories, 2002.

    Google Scholar 

  11. Avizienis A, Laprie J C, Randell B,et al. Basic Concepts and Taxonomy of Dependable and Secure computing [J].IEEE Transaction on Dependable and Secure Computing, 2004,1 (1):11–33.

    Article  Google Scholar 

  12. Trusted Computing Group. TPM Software Stack (TSS) Specifications[EB/OL]. [2005-12-1]https://www.trustedcomputing group.org/specs/TSS/.

  13. Trusted Computing Group. Trusted Network Connect Specification [EB/OL]. 2005-3-13].https://www.trustedcomputinggroup.org/groups/network/.

  14. National Computer Security Center. NCSC-TG-021. Trusted Database Management System Interpretation [S]. Washington: US DOD, April 1991.

    Google Scholar 

  15. National Computer Security Center. NCSC-TG-005. Trusted Network Interpretation of the Trusted Computer System Evaluation Criteria [S]. Washington: US DOD, July 1987.

    Google Scholar 

  16. The Open Trusted Computing (Open TC) consortium. General activities of Open TC [EB/OL]. [2006-01-16].http://www.opentc. net/activities/.

  17. Zhang Huanguo, Wu Guoqing, Qin Zhongpinget al. A New 7Type of Trusted Computer [J].Journal of Wuhan University (Natural Science). 2004,50(S1):1–6 (Ch.)

    MathSciNet  Google Scholar 

  18. Zhang Huanguo, Liu Yuzhen, Yu Fajiang,et al. A New Type of Embedded Security Module [J].Journal of Wuhan University (Natural Science). 2004,50(S1):7–11 (Ch).

    Article  Google Scholar 

  19. Lin Chuang, Peng Xuehai. Trusted Network Research [J].The Chinese Journal of Computers, 2005,28 (5):751–758 (Ch).

    Google Scholar 

  20. Daonity Team. Daonity Specifications Part I Design [EB/OL]. [2006-01-13]https://forge.gridforum.org/projects/torg.

  21. Chen Huowang, Wang Ji, Dong Wei. The High Trusted Software Engineer Technology [J].The Chinese Journal of Electronics, 2003,31(12A):1933–1938 (Ch).

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Zhang Huanguo.

Additional information

Foundation item: Supported by the National Natural Science Foundation of China (90104005, 60373087, 60473023) and Network and Information Security Key Laboratory Program of Ministry of Education of China

Biography: ZHANG Huanguo (1945-), male, Professor, research direction; information security, trusted computing, faalt-tolerant computing

Rights and permissions

Reprints and permissions

About this article

Cite this article

Huanguo, Z., Jie, L., Gang, J. et al. Development of trusted computing research. Wuhan Univ. J. Nat. Sci. 11, 1407–1413 (2006). https://doi.org/10.1007/BF02831786

Download citation

  • Received:

  • Issue Date:

  • DOI: https://doi.org/10.1007/BF02831786

Key words

CLC number

Navigation