|Table of Contents|

Engineering Approaches to Implementation of Trusted Security System(PDF)

南京师范大学学报(工程技术版)[ISSN:1006-6977/CN:61-1281/TN]

Issue:
2010年03期
Page:
69-73
Research Field:
Publishing date:

Info

Title:
Engineering Approaches to Implementation of Trusted Security System
Author(s):
Shen LinglingSheng HehuaQian Gang
Department of Management Science and Engineering,Nanjing Normal University,Nanjing 210097,China
Keywords:
trusted secur ity trusted security eng ineer ingm ode l im plem entation approach
PACS:
TP309
DOI:
-
Abstract:
Th is paper analyzes the problem s o f how to establish trusted secur ity system, and g ives the reasons o f leading eng ineer ing and system aticm e thod into the fu ll life-cycle o f trusted security system. On th is basis, w e propose a pro cessbased m ode l for trusted secur ity system and approaches to Im plem entation trusted security baseline under the gu idance o f the mode l. Trusted secur ity eng inee ring appro ach is usefully d iscussed at last

References:

[ 1] Da tta A, Frank lin J, Garg D, et a .l A log ic of secure systems and its applica tion to trusted com puting[ J]. Secur ity and Privacy, IEEE Symposium, 2009, 30: 221-236.
[ 2] M unoz A, M ana A, Serrano D. The ro le of trusted com puting in secure agen tm igration[ C] / / Research Cha llenges in Inform ation Sc ience, Third Internationa l Con ference. Fez, 2009: 255-264.
[ 3] G las B, K limm A, Mu ller-G lase rK D, et a .l Configuration m easurement fo rFPGA-based trusted platfo rm s[ C] / / Proceed ing s o f the 2009 IEEE / IFIP Interna tiona l Symposium on Rapid System Pro to typing. W ash ington DC: IEEE Com pute r Soc ie ty, 2009: 123-129.
[ 4] Zhu Lu, Yu Sheng, Zhang Xing, et a .l Form a l com pa tibility model fo r trusted computing applications[ J] . W uhan Un iversity Jou rnal of Na tura l Sc iences, 2009, 14( 5) : 338-392.
[ 5] 龚敏明, 石志国. 可信计算及其安全性应用研究综述[ J]. 江西师范大学学报: 自然科学版, 2009, 33( 3) : 348-352. Gong M inm ing, Sh i Zh iguo. The research survey of trusted computing and its app lication o f secur ity[ J]. Jou rna l o f Jiangx i No rm alUn iv ers ity: Natural Sc ience Edition, 2009, 33( 3): 348-352. ( in Ch inese)
[ 6] 郑志明, 马世龙, 李未, 等. 软件可信性动力学特征以其演化复杂性[ J]. 中国科学( F辑): 信息科学, 2009, 39( 9): 946-950. Zheng Zhim ing, M a Sh ilong, L iW e,i et a.l K inetics character istic and com plex ity o f evo lution of so ftw are trustw orth iness[ J].Sc ience in Ch ina( F) : Inform ation Science Ed ition, 2009, 39( 9): 946-950. ( in Ch inese)

Memo

Memo:
-
Last Update: 2013-04-02