Title :
Research and Development of Trusted Computing in China
Author_Institution :
Comput. Sch., Wuhan Univ., Wuhan
Abstract :
Summary form only given. Through the practice of information security, people have realized that the causation of security mainly comes from microcomputer terminal. To ensure the source security of microcomputer terminal, the solution must synthetically integrate different security technologies including chips, hardware architecture, and operating system, etc., which is the original idea of trusted computing.
Keywords :
microcomputers; security of data; China; hardware architecture; information security; microcomputer terminal; operating system; trusted computing; Application software; Educational technology; Information security; Laboratories; Microcomputers; Personal digital assistants; Research and development; Resource management; Software testing; System testing;
Conference_Titel :
Trusted Infrastructure Technologies Conference, 2008. APTC '08. Third Asia-Pacific
Conference_Location :
Hubei
Print_ISBN :
978-0-7695-3363-6
DOI :
10.1109/APTC.2008.19