Computer Science ›› 2015, Vol. 42 ›› Issue (10): 154-158.
Previous Articles Next Articles
JIN Lei, XU Kai-yong, LI Jian-fei and CHENG Mao-cai
[1] 冯登国,秦宇,汪丹,等.可信计算技术研究[J].计算机研究与发展,2011,48(8):1332-1349 Feng D G,Qin Y,Wang D,et al.Research on Trusted Computing Technology[J].Journal of Computer Research and Develo-pment,2011,48(8):1332-1349 [2] McDysan D,Lee T H,Yao Lei.Network Access System Including a Programmable Access Device Having Distributed Service Control 7499458B2[P].2009-03-03 [3] Frias-Martines V,Sherrick J,Stolfo S J.A Network Access Control Mechanism Based on Behavior Profiles[C]∥Annual Computer Security Application Conference(ACSAC’09).Honolulu,2009:03-12 [4] 梅芳,刘衍珩,王健,等.基于可信网络的修复建模与实现[J].计算机研究与发展,2009,46(zl):328-331 Mei F,Liu Y Y,Wang J,et al.Modeling and Realizing of Remediation Based on Trusted Network[J].Journal of Computer Research and Development,2009,46(zl):328-331 [5] 张焕国,陈璐,张立强.可信网络连接研究[J].计算机学报,2010,33(4):706-717 Zhang H Q,Chen L,Zhang L Q.Research on Trusted Network Connection[J].Chinese Journal of Computers,2010,33(4):706-717 [6] 沈昌祥,张焕国,王怀民,等.可信计算的研究与发展[J].中国科学:信息科学,2010,40(2):139-166 Shen C X,Zhang H G,Wang H M,et al.Research and Development of Trusted Computing[J].Science China Information Scie-nces,2010,40(2):139-166 [7] 孙守胜.基于国产可信计算平台的可信终端的应用研究[D].北京:北京交通大学,2011 Sun S S.Research on Application of Secrecy-involved Terminal Based on Trusted Computing Platform[D].Beijing:Beijing Jiaotong University,2011 [8] 王浩,陈泽茂,李铮,等.基于可信网络连接的多级涉密网安全接入方案[J].计算机科学,2012,39(12):65-69 Wang H,Chen Z M,Li Z,et al.Secure Access Scheme Based on TNC for Multi-level Classified Network[J].Computer Science,2012,39(12):65-69 [9] 王宇,王飞.涉密信息系统网络安全需求分析与解决方案[J].装备学院学报,2013,24(4):105-109 Wang Y,Wang F.Trusted Security Demand Analysis and Solution of the Secret Information System Network[J].Journal of Academy of Equipment,2013,24(4):105-109 [10] 谷德丽.可信网络接入远程证明方案的研究[D].哈尔滨:哈尔滨工程大学,2013 Gu D L.Research on Trusted Network Access and Remote Attestation and Scheme[D].Harbin:Harbin Engineering University,2013 [11] 刘迎春,郑小林,陈德人.信任网络中基于角色信誉的信任预测[J].北京邮电大学学报,2013,36(1):72-76 Liu Y C,Zheng X L,Chen D R.Trust Predication Based on The Credibility of The Role in Trust Network[J].Journal of Beijing University of Posts and Telecommunications,2013,36(1):72-76 [12] 刘一博,殷肖川,高培勇,等.基于可信计算的网络互联模型[J].计算机应用,2014,34(7):1936-1940 Liu Y B,Yin X C,Gao P Y,et al.Network Interconnection mo-del Based on Trusted Computing[J].Journal of Computer Applications,2014,34(7):1936-1940 [13] 戴桦.基于可信计算技术的信任评估机制研究[D].南京:南京邮电大学,2011 Dai H.Research on Trust Evaluation Mechanism Based on Trusted Computing Technology[D].Nanjing:Nanjing University of Posts and Telecommunications,2011 |
No related articles found! |
|