• DocumentCode
    3398303
  • Title

    The trusted computing environment construction based on JTSS

  • Author

    Wang Xingkui ; Peng Xinguang

  • Author_Institution
    Coll. of Comput. Sci. & Technol., Taiyuan Univ. of Technol., Taiyuan, China
  • fYear
    2011
  • fDate
    19-22 Aug. 2011
  • Firstpage
    2252
  • Lastpage
    2256
  • Abstract
    Trusted computing technology is the mainstream technology for information security.lt has technical extension for asymmetric computing technology and password protection technology as the foundation,to allow information security technology development from passive defense turned to active defense direction. Security strategy from the nets facilities to internal system security, and security deepening of the concrete application scheme. Trusted computing platform is the basis of "Trusted computing".Illegal users unable to change the internal data, thus ensuring security to identity authentication and data encryption. This paper through the open-source TMP Emulator and IAIK jTSS constructed trusted computing platform. For the following experiment provides trusted environment.
  • Keywords
    cryptography; IAIK jTSS; asymmetric computing technology; data encryption; identity authentication; information security technology development; open-source TMP Emulator; password protection technology; trusted computing environment construction; Computers; Hardware; Java; Libraries; Linux; Security; Software; IAIK jTSS; TPM emulator; TSP; TSS; Trusted Computing;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Mechatronic Science, Electric Engineering and Computer (MEC), 2011 International Conference on
  • Conference_Location
    Jilin
  • Print_ISBN
    978-1-61284-719-1
  • Type

    conf

  • DOI
    10.1109/MEC.2011.6025941
  • Filename
    6025941