###
工程科学与技术:2014,46(1):1-7
←前一篇   |   后一篇→
本文二维码信息
码上扫一扫!
基于可信计算构建纵深防御的信息安全保障体系
(1.海军计算技术研究所;2.四川大学 计算机学院 网络与可信计算研究所)
Construction of the Information Security Infrastructure Based on Trusted Computing
(1.ComputingTechnol.Inst.ofNavy;2.Inst. of Network and Trusted Computing,College of Computer Sci.,Sichuan Univ.)
摘要
图/表
参考文献
相似文献
本文已被:浏览 2495次   下载 2
投稿时间:2013-12-16    
中文摘要: 根据美国网络空间安全战略的启示,阐述了中国信息安全面临的挑战和主要任务;从加强信息安全保障体系建设、可信计算体系框架、创新发展可信计算等方面,详细阐述了如何将可信计算用于积极构建纵深防御体系,以及在这个防御体系构建过程中的创新点;最后,提出了捍卫中国网络空间主权、自主研发、网络防护体系、人才培养等方面的建议。
Abstract:According to the revelation of American cyberspace security strategy, the main task and challenges of information security in China were described. In terms of strengthening the construction of information security system, trusted computing system framework, the innovation and development of trusted computing and so on, how to use trusted computing for actively build a deep defense system and the innovation of the construction process of this system were elaborated. Finally, some suggestions in defence of sovereignty for cyberspace, independent research and development, network security frame, personnel training and development treads were put forward.
文章编号:20140101     中图分类号:    文献标志码:
基金项目:
作者简介:
引用文本:
沈昌祥,陈兴蜀.基于可信计算构建纵深防御的信息安全保障体系[J].工程科学与技术,2014,46(1):1-7.
Shen Changxiang,Chen Xingshu.Construction of the Information Security Infrastructure Based on Trusted Computing[J].Advanced Engineering Sciences,2014,46(1):1-7.