Loading…
Application research of trusted computing platform in electric power information system
In recent years, the rapid development of trusted computing with active defense ideas to solve security problem of computer and network system, and trusted computing is believed to be the most likely fundamentally solve the security of computer system. This paper puts forward an application scheme o...
Saved in:
Main Authors: | , |
---|---|
Format: | Conference Proceeding |
Language: | English |
Subjects: | |
Online Access: | Request full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
cited_by | |
---|---|
cites | |
container_end_page | 215 |
container_issue | |
container_start_page | 212 |
container_title | |
container_volume | 1 |
creator | Ren Liu Dongxiao Niu |
description | In recent years, the rapid development of trusted computing with active defense ideas to solve security problem of computer and network system, and trusted computing is believed to be the most likely fundamentally solve the security of computer system. This paper puts forward an application scheme of trusted computing platform being used in electric power information system. According to security requirements of electric power information system, it designs a method of constructing dynamic trust chain based on system management mode (SMM), and makes dynamic measurement to system program and key application, in order to ensure operating system environment integrity and trusty, effectively defenses against malicious code, make great efforts to enhance power information system security defense capabilities. |
doi_str_mv | 10.1109/ICNDS.2010.5479155 |
format | conference_proceeding |
fullrecord | <record><control><sourceid>ieee_6IE</sourceid><recordid>TN_cdi_ieee_primary_5479155</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>5479155</ieee_id><sourcerecordid>5479155</sourcerecordid><originalsourceid>FETCH-LOGICAL-i90t-87c5162362c056430d156a93ef42e0157b404d31ee3b3c202e63324e9790eedc3</originalsourceid><addsrcrecordid>eNotUNtKAzEUDEhBW_sD-pIf2HqSnGTNY6m3QtEHCz6WNHtWI3sjSZH-vVvaeRnODDMchrE7AQshwD6sV-9PnwsJ462xtELrKzYVKBG1MBImbCoBrFUIBq_ZPKVfGIFaGqlv2NdyGJrgXQ59xyMlctH_8L7mOR5Spor7vh0OOXTffGhcrvvY8tBxasjnGDwf-j-Ko3IyziXpOObaWzapXZNofuEZ2748b1dvxebjdb1abopgIRePpT89qYz0oA0qqIQ2ziqqURIIXe4RsFKCSO2VlyDJKCWRbGmBqPJqxu7PtYGIdkMMrYvH3WUH9Q-5U1J1</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>Application research of trusted computing platform in electric power information system</title><source>IEEE Electronic Library (IEL) Conference Proceedings</source><creator>Ren Liu ; Dongxiao Niu</creator><creatorcontrib>Ren Liu ; Dongxiao Niu</creatorcontrib><description>In recent years, the rapid development of trusted computing with active defense ideas to solve security problem of computer and network system, and trusted computing is believed to be the most likely fundamentally solve the security of computer system. This paper puts forward an application scheme of trusted computing platform being used in electric power information system. According to security requirements of electric power information system, it designs a method of constructing dynamic trust chain based on system management mode (SMM), and makes dynamic measurement to system program and key application, in order to ensure operating system environment integrity and trusty, effectively defenses against malicious code, make great efforts to enhance power information system security defense capabilities.</description><identifier>ISBN: 1424451620</identifier><identifier>ISBN: 9781424451623</identifier><identifier>DOI: 10.1109/ICNDS.2010.5479155</identifier><identifier>LCCN: 2009934064</identifier><language>eng</language><publisher>IEEE</publisher><subject>Application software ; Computer networks ; Computer security ; Design methodology ; electric power information system ; Energy management ; Environmental management ; Information security ; Information systems ; Management information systems ; Power system security ; system management mode ; trusted chain ; trusted computer</subject><ispartof>2010 International Conference on Networking and Digital Society, 2010, Vol.1, p.212-215</ispartof><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/5479155$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,776,780,785,786,2052,27901,54894</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/5479155$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Ren Liu</creatorcontrib><creatorcontrib>Dongxiao Niu</creatorcontrib><title>Application research of trusted computing platform in electric power information system</title><title>2010 International Conference on Networking and Digital Society</title><addtitle>ICNDS</addtitle><description>In recent years, the rapid development of trusted computing with active defense ideas to solve security problem of computer and network system, and trusted computing is believed to be the most likely fundamentally solve the security of computer system. This paper puts forward an application scheme of trusted computing platform being used in electric power information system. According to security requirements of electric power information system, it designs a method of constructing dynamic trust chain based on system management mode (SMM), and makes dynamic measurement to system program and key application, in order to ensure operating system environment integrity and trusty, effectively defenses against malicious code, make great efforts to enhance power information system security defense capabilities.</description><subject>Application software</subject><subject>Computer networks</subject><subject>Computer security</subject><subject>Design methodology</subject><subject>electric power information system</subject><subject>Energy management</subject><subject>Environmental management</subject><subject>Information security</subject><subject>Information systems</subject><subject>Management information systems</subject><subject>Power system security</subject><subject>system management mode</subject><subject>trusted chain</subject><subject>trusted computer</subject><isbn>1424451620</isbn><isbn>9781424451623</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2010</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><recordid>eNotUNtKAzEUDEhBW_sD-pIf2HqSnGTNY6m3QtEHCz6WNHtWI3sjSZH-vVvaeRnODDMchrE7AQshwD6sV-9PnwsJ462xtELrKzYVKBG1MBImbCoBrFUIBq_ZPKVfGIFaGqlv2NdyGJrgXQ59xyMlctH_8L7mOR5Spor7vh0OOXTffGhcrvvY8tBxasjnGDwf-j-Ko3IyziXpOObaWzapXZNofuEZ2748b1dvxebjdb1abopgIRePpT89qYz0oA0qqIQ2ziqqURIIXe4RsFKCSO2VlyDJKCWRbGmBqPJqxu7PtYGIdkMMrYvH3WUH9Q-5U1J1</recordid><startdate>201005</startdate><enddate>201005</enddate><creator>Ren Liu</creator><creator>Dongxiao Niu</creator><general>IEEE</general><scope>6IE</scope><scope>6IL</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIL</scope></search><sort><creationdate>201005</creationdate><title>Application research of trusted computing platform in electric power information system</title><author>Ren Liu ; Dongxiao Niu</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-i90t-87c5162362c056430d156a93ef42e0157b404d31ee3b3c202e63324e9790eedc3</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2010</creationdate><topic>Application software</topic><topic>Computer networks</topic><topic>Computer security</topic><topic>Design methodology</topic><topic>electric power information system</topic><topic>Energy management</topic><topic>Environmental management</topic><topic>Information security</topic><topic>Information systems</topic><topic>Management information systems</topic><topic>Power system security</topic><topic>system management mode</topic><topic>trusted chain</topic><topic>trusted computer</topic><toplevel>online_resources</toplevel><creatorcontrib>Ren Liu</creatorcontrib><creatorcontrib>Dongxiao Niu</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE/IET Electronic Library (IEL)</collection><collection>IEEE Proceedings Order Plans (POP All) 1998-Present</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Ren Liu</au><au>Dongxiao Niu</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>Application research of trusted computing platform in electric power information system</atitle><btitle>2010 International Conference on Networking and Digital Society</btitle><stitle>ICNDS</stitle><date>2010-05</date><risdate>2010</risdate><volume>1</volume><spage>212</spage><epage>215</epage><pages>212-215</pages><isbn>1424451620</isbn><isbn>9781424451623</isbn><abstract>In recent years, the rapid development of trusted computing with active defense ideas to solve security problem of computer and network system, and trusted computing is believed to be the most likely fundamentally solve the security of computer system. This paper puts forward an application scheme of trusted computing platform being used in electric power information system. According to security requirements of electric power information system, it designs a method of constructing dynamic trust chain based on system management mode (SMM), and makes dynamic measurement to system program and key application, in order to ensure operating system environment integrity and trusty, effectively defenses against malicious code, make great efforts to enhance power information system security defense capabilities.</abstract><pub>IEEE</pub><doi>10.1109/ICNDS.2010.5479155</doi><tpages>4</tpages></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | ISBN: 1424451620 |
ispartof | 2010 International Conference on Networking and Digital Society, 2010, Vol.1, p.212-215 |
issn | |
language | eng |
recordid | cdi_ieee_primary_5479155 |
source | IEEE Electronic Library (IEL) Conference Proceedings |
subjects | Application software Computer networks Computer security Design methodology electric power information system Energy management Environmental management Information security Information systems Management information systems Power system security system management mode trusted chain trusted computer |
title | Application research of trusted computing platform in electric power information system |
url | http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-24T14%3A30%3A59IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-ieee_6IE&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=Application%20research%20of%20trusted%20computing%20platform%20in%20electric%20power%20information%20system&rft.btitle=2010%20International%20Conference%20on%20Networking%20and%20Digital%20Society&rft.au=Ren%20Liu&rft.date=2010-05&rft.volume=1&rft.spage=212&rft.epage=215&rft.pages=212-215&rft.isbn=1424451620&rft.isbn_list=9781424451623&rft_id=info:doi/10.1109/ICNDS.2010.5479155&rft_dat=%3Cieee_6IE%3E5479155%3C/ieee_6IE%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-i90t-87c5162362c056430d156a93ef42e0157b404d31ee3b3c202e63324e9790eedc3%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=5479155&rfr_iscdi=true |