首页> 外文会议>International conference on computer engineering and network >The Application of Trusted Computing Technology in the Cloud Security
【24h】

The Application of Trusted Computing Technology in the Cloud Security

机译:可信计算技术在云安全中的应用

获取原文
获取外文期刊封面目录资料

摘要

For the lack of safety and reliability of the information in the cloud computing environment, in order to create a more flexible and adaptable security mechanism, the combination of cloud computing and credible concept is a major research direction in today's security. Based on the view mentioned above, this paper strengthens the research of trust computing technology to solve the security issues in cloud and cloud-based trust transfer, on the basis of the practical work of the experts and scholars on the trust transfer technology, and expands the theoretical model of the trust chain. This paper uses the stochastic process algebra and Petri nets as a modeling tool to build two trust chain models, demonstrates the credibility of certain behavioral characteristics of the chain, analyzes several constraints of credible chain, and provides a valuable reference for engineering practice of the credible chain.
机译:由于云计算环境中信息的安全性和可靠性不足,为了创建更加灵活和适应性强的安全机制,将云计算与可信概念相结合是当今安全性的主要研究方向。基于上述观点,本文在专家和学者关于信任转移技术的实践工作的基础上,加强了对信任计算技术的研究,以解决云和基于云的信任转移中的安全性问题,并进行了扩展。信任链的理论模型。本文以随机过程代数和Petri网为建模工具,建立了两个信任链模型,论证了链的某些行为特征的可信度,分析了可信链的若干约束条件,为可信链的工程实践提供了有价值的参考。链。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号