中国工程科学2016,Vol.18Issue(6):53-57,5.DOI:10.15302/J-SSCAE-2016.06.011
可信3.0战略:可信计算的革命性演变
The Strategy of TC 3.0:A Revolutionary Evolution in Trusted Computing
摘要
Abstract
This paper introduces the status, problems, and future strategies of the traditional defense system and analyzes issues in the current protection structure. We then propose the trusted computing (TC) 3.0 strategy, which is an active defense architecture based on active immunity. Furthermore, we give an example of TC 3.0 in cloud computing and provide some suggestions on enforcing active defense.关键词
可信3.0/主动防御/主动免疫/等级保护/防护框架Key words
trusted computing (TC) 3.0/active defense/active immunity/multi-level protection/protection structure分类
信息技术与安全科学引用本文复制引用
沈昌祥,张大伟,刘吉强,叶珩,邱硕..可信3.0战略:可信计算的革命性演变[J].中国工程科学,2016,18(6):53-57,5.基金项目
中国工程院重大咨询项目“网络空间安全战略研究”(2015-ZD-10) (2015-ZD-10)