Integrity Measurement based on Trusted Computing
- DOI
- 10.2991/icimm-15.2015.174How to use a DOI?
- Keywords
- Trusted Computing; Integrity Measurement; Remote Attestation
- Abstract
With the rapid development of modern information technology, more and more people believe that the protection of hardware equipment must be enhanced in order to improve the security capabilities of computer information systems better. Trusted computing improve the trustworthiness of system through the secure chip from hardware level, using the trusted root, chain of trust, trusted model to ensure the integrity of the system, and expands the trusted chain to application layer, ensures the credibility of software through measurement and verification technology. In this paper, we will introduce related hot research about integrity measurement.
- Copyright
- © 2015, the Authors. Published by Atlantis Press.
- Open Access
- This is an open access article distributed under the CC BY-NC license (http://creativecommons.org/licenses/by-nc/4.0/).
Cite this article
TY - CONF AU - Yiming Li AU - Haihe Ba AU - Jiangchun Ren PY - 2015/07 DA - 2015/07 TI - Integrity Measurement based on Trusted Computing BT - Proceedings of the 5th International Conference on Information Engineering for Mechanics and Materials PB - Atlantis Press SP - 956 EP - 959 SN - 2352-5401 UR - https://doi.org/10.2991/icimm-15.2015.174 DO - 10.2991/icimm-15.2015.174 ID - Li2015/07 ER -