1. Survey on key technology development and application in trusted computing
- Author
-
Bo Zhao, Liqiang Zhang, Juan Wang, Yuan Shi, Huanguo Zhang, Guojun Peng, Fajiang Yu, and Fei Yan
- Subjects
Trusted service manager ,Computer Networks and Communications ,Computer science ,business.industry ,05 social sciences ,020207 software engineering ,Cloud computing ,02 engineering and technology ,Trusted Computing ,050905 science studies ,Trusted Network Connect ,Computer security ,computer.software_genre ,0202 electrical engineering, electronic engineering, information engineering ,Direct Anonymous Attestation ,Key (cryptography) ,Trusted Platform Module ,0509 other social sciences ,Electrical and Electronic Engineering ,business ,computer ,Hengzhi chip - Abstract
Trusted computing, which can effectively increase the credibility of information system, has made great achievements and is in continuous development. For country who is going to strengthen network construction like China, it is an important fundamental supporting technology worth researching. China is in the international forefront in the field of trusted computing. This paper gives comprehensive introductions to the new development and application of key technologies in trusted computing, such as various trusted platform modules (TPM, TCM, TPCM), TCG Software Stack (TSS), trusted cloud server and Trusted Execution Environment (TEE). We illustrate the progressing and application extension of these technologies and also point out some key problems worth studying in the future.
- Published
- 2016
- Full Text
- View/download PDF