Title :
The trusted computing environment construction based on JTSS
Author :
Wang Xingkui ; Peng Xinguang
Author_Institution :
Coll. of Comput. Sci. & Technol., Taiyuan Univ. of Technol., Taiyuan, China
Abstract :
Trusted computing technology is the mainstream technology for information security.lt has technical extension for asymmetric computing technology and password protection technology as the foundation,to allow information security technology development from passive defense turned to active defense direction. Security strategy from the nets facilities to internal system security, and security deepening of the concrete application scheme. Trusted computing platform is the basis of "Trusted computing".Illegal users unable to change the internal data, thus ensuring security to identity authentication and data encryption. This paper through the open-source TMP Emulator and IAIK jTSS constructed trusted computing platform. For the following experiment provides trusted environment.
Keywords :
cryptography; IAIK jTSS; asymmetric computing technology; data encryption; identity authentication; information security technology development; open-source TMP Emulator; password protection technology; trusted computing environment construction; Computers; Hardware; Java; Libraries; Linux; Security; Software; IAIK jTSS; TPM emulator; TSP; TSS; Trusted Computing;
Conference_Titel :
Mechatronic Science, Electric Engineering and Computer (MEC), 2011 International Conference on
Conference_Location :
Jilin
Print_ISBN :
978-1-61284-719-1
DOI :
10.1109/MEC.2011.6025941