{"title":"可信计算平台在电力信息系统中的应用研究","authors":"Ren-Jye Liu, D. Niu","doi":"10.1109/ICNDS.2010.5479155","DOIUrl":null,"url":null,"abstract":"In recent years, the rapid development of trusted computing with active defense ideas to solve security problem of computer and network system, and trusted computing is believed to be the most likely fundamentally solve the security of computer system. This paper puts forward an application scheme of trusted computing platform being used in electric power information system. According to security requirements of electric power information system, it designs a method of constructing dynamic trust chain based on system management mode (SMM), and makes dynamic measurement to system program and key application, in order to ensure operating system environment integrity and trusty, effectively defenses against malicious code, make great efforts to enhance power information system security defense capabilities.","PeriodicalId":403283,"journal":{"name":"2010 International Conference on Networking and Digital Society","volume":"2 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2010-06-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Application research of trusted computing platform in electric power information system\",\"authors\":\"Ren-Jye Liu, D. Niu\",\"doi\":\"10.1109/ICNDS.2010.5479155\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In recent years, the rapid development of trusted computing with active defense ideas to solve security problem of computer and network system, and trusted computing is believed to be the most likely fundamentally solve the security of computer system. This paper puts forward an application scheme of trusted computing platform being used in electric power information system. According to security requirements of electric power information system, it designs a method of constructing dynamic trust chain based on system management mode (SMM), and makes dynamic measurement to system program and key application, in order to ensure operating system environment integrity and trusty, effectively defenses against malicious code, make great efforts to enhance power information system security defense capabilities.\",\"PeriodicalId\":403283,\"journal\":{\"name\":\"2010 International Conference on Networking and Digital Society\",\"volume\":\"2 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2010-06-07\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2010 International Conference on Networking and Digital Society\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICNDS.2010.5479155\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2010 International Conference on Networking and Digital Society","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICNDS.2010.5479155","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Application research of trusted computing platform in electric power information system
In recent years, the rapid development of trusted computing with active defense ideas to solve security problem of computer and network system, and trusted computing is believed to be the most likely fundamentally solve the security of computer system. This paper puts forward an application scheme of trusted computing platform being used in electric power information system. According to security requirements of electric power information system, it designs a method of constructing dynamic trust chain based on system management mode (SMM), and makes dynamic measurement to system program and key application, in order to ensure operating system environment integrity and trusty, effectively defenses against malicious code, make great efforts to enhance power information system security defense capabilities.