{"title":"基于可信计算的远程认证分析与研究","authors":"Jiaming Guo, Jiang Wei","doi":"10.1109/ICDMA.2013.45","DOIUrl":null,"url":null,"abstract":"The trusted computing technology are developing gradually, and was applied in the network. So the trusted network is been proposed and researched, and method of remote attestation is the key technique in the study. According to current situation of study, outline several system of the trusted network nowadays, and analyzed the basic ideas and implementations of several typical remote attestation methods, compared and analyzed their advantages and disadvantages. At the same time pointed out the applicable occasions of several remote attestation methods, putted forward some insufficient for these remote attestation methods, and pointed out the direction for the future of remote attestation.","PeriodicalId":403312,"journal":{"name":"2013 Fourth International Conference on Digital Manufacturing & Automation","volume":" 13","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2013-06-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"Analysis and Research of Remote Attestation Based on Trusted Computing\",\"authors\":\"Jiaming Guo, Jiang Wei\",\"doi\":\"10.1109/ICDMA.2013.45\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The trusted computing technology are developing gradually, and was applied in the network. So the trusted network is been proposed and researched, and method of remote attestation is the key technique in the study. According to current situation of study, outline several system of the trusted network nowadays, and analyzed the basic ideas and implementations of several typical remote attestation methods, compared and analyzed their advantages and disadvantages. At the same time pointed out the applicable occasions of several remote attestation methods, putted forward some insufficient for these remote attestation methods, and pointed out the direction for the future of remote attestation.\",\"PeriodicalId\":403312,\"journal\":{\"name\":\"2013 Fourth International Conference on Digital Manufacturing & Automation\",\"volume\":\" 13\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2013-06-29\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2013 Fourth International Conference on Digital Manufacturing & Automation\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICDMA.2013.45\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2013 Fourth International Conference on Digital Manufacturing & Automation","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICDMA.2013.45","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Analysis and Research of Remote Attestation Based on Trusted Computing
The trusted computing technology are developing gradually, and was applied in the network. So the trusted network is been proposed and researched, and method of remote attestation is the key technique in the study. According to current situation of study, outline several system of the trusted network nowadays, and analyzed the basic ideas and implementations of several typical remote attestation methods, compared and analyzed their advantages and disadvantages. At the same time pointed out the applicable occasions of several remote attestation methods, putted forward some insufficient for these remote attestation methods, and pointed out the direction for the future of remote attestation.