Abstract:Trusted computing is a hotspot of information security research nowadays. It is developed based on computed system. From science computing and fault-tolerant computing to trusted computing, the origin and development of trusted computing were introduced, especially its property, trusted computer system, and architecture and key components of the trusted platform module. The current research and difficult problems of trusted software system have also been summarized.
马新强 Huang Yi 李丹宁. 可信计算发展研究[J]. 计算机应用, 2009, 29(4): 920-923.
Xin-Qiang MA Yi HUANG dan-ning LI. Study on development of trusted computing. Journal of Computer Applications, 2009, 29(4): 920-923.