DocumentCode
3398303
Title
The trusted computing environment construction based on JTSS
Author
Wang Xingkui ; Peng Xinguang
Author_Institution
Coll. of Comput. Sci. & Technol., Taiyuan Univ. of Technol., Taiyuan, China
fYear
2011
fDate
19-22 Aug. 2011
Firstpage
2252
Lastpage
2256
Abstract
Trusted computing technology is the mainstream technology for information security.lt has technical extension for asymmetric computing technology and password protection technology as the foundation,to allow information security technology development from passive defense turned to active defense direction. Security strategy from the nets facilities to internal system security, and security deepening of the concrete application scheme. Trusted computing platform is the basis of "Trusted computing".Illegal users unable to change the internal data, thus ensuring security to identity authentication and data encryption. This paper through the open-source TMP Emulator and IAIK jTSS constructed trusted computing platform. For the following experiment provides trusted environment.
Keywords
cryptography; IAIK jTSS; asymmetric computing technology; data encryption; identity authentication; information security technology development; open-source TMP Emulator; password protection technology; trusted computing environment construction; Computers; Hardware; Java; Libraries; Linux; Security; Software; IAIK jTSS; TPM emulator; TSP; TSS; Trusted Computing;
fLanguage
English
Publisher
ieee
Conference_Titel
Mechatronic Science, Electric Engineering and Computer (MEC), 2011 International Conference on
Conference_Location
Jilin
Print_ISBN
978-1-61284-719-1
Type
conf
DOI
10.1109/MEC.2011.6025941
Filename
6025941
Link To Document