Loading…

Application research of trusted computing platform in electric power information system

In recent years, the rapid development of trusted computing with active defense ideas to solve security problem of computer and network system, and trusted computing is believed to be the most likely fundamentally solve the security of computer system. This paper puts forward an application scheme o...

Full description

Saved in:
Bibliographic Details
Main Authors: Ren Liu, Dongxiao Niu
Format: Conference Proceeding
Language:English
Subjects:
Online Access:Request full text
Tags: Add Tag
No Tags, Be the first to tag this record!
cited_by
cites
container_end_page 215
container_issue
container_start_page 212
container_title
container_volume 1
creator Ren Liu
Dongxiao Niu
description In recent years, the rapid development of trusted computing with active defense ideas to solve security problem of computer and network system, and trusted computing is believed to be the most likely fundamentally solve the security of computer system. This paper puts forward an application scheme of trusted computing platform being used in electric power information system. According to security requirements of electric power information system, it designs a method of constructing dynamic trust chain based on system management mode (SMM), and makes dynamic measurement to system program and key application, in order to ensure operating system environment integrity and trusty, effectively defenses against malicious code, make great efforts to enhance power information system security defense capabilities.
doi_str_mv 10.1109/ICNDS.2010.5479155
format conference_proceeding
fullrecord <record><control><sourceid>ieee_6IE</sourceid><recordid>TN_cdi_ieee_primary_5479155</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>5479155</ieee_id><sourcerecordid>5479155</sourcerecordid><originalsourceid>FETCH-LOGICAL-i90t-87c5162362c056430d156a93ef42e0157b404d31ee3b3c202e63324e9790eedc3</originalsourceid><addsrcrecordid>eNotUNtKAzEUDEhBW_sD-pIf2HqSnGTNY6m3QtEHCz6WNHtWI3sjSZH-vVvaeRnODDMchrE7AQshwD6sV-9PnwsJ462xtELrKzYVKBG1MBImbCoBrFUIBq_ZPKVfGIFaGqlv2NdyGJrgXQ59xyMlctH_8L7mOR5Spor7vh0OOXTffGhcrvvY8tBxasjnGDwf-j-Ko3IyziXpOObaWzapXZNofuEZ2748b1dvxebjdb1abopgIRePpT89qYz0oA0qqIQ2ziqqURIIXe4RsFKCSO2VlyDJKCWRbGmBqPJqxu7PtYGIdkMMrYvH3WUH9Q-5U1J1</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>Application research of trusted computing platform in electric power information system</title><source>IEEE Electronic Library (IEL) Conference Proceedings</source><creator>Ren Liu ; Dongxiao Niu</creator><creatorcontrib>Ren Liu ; Dongxiao Niu</creatorcontrib><description>In recent years, the rapid development of trusted computing with active defense ideas to solve security problem of computer and network system, and trusted computing is believed to be the most likely fundamentally solve the security of computer system. This paper puts forward an application scheme of trusted computing platform being used in electric power information system. According to security requirements of electric power information system, it designs a method of constructing dynamic trust chain based on system management mode (SMM), and makes dynamic measurement to system program and key application, in order to ensure operating system environment integrity and trusty, effectively defenses against malicious code, make great efforts to enhance power information system security defense capabilities.</description><identifier>ISBN: 1424451620</identifier><identifier>ISBN: 9781424451623</identifier><identifier>DOI: 10.1109/ICNDS.2010.5479155</identifier><identifier>LCCN: 2009934064</identifier><language>eng</language><publisher>IEEE</publisher><subject>Application software ; Computer networks ; Computer security ; Design methodology ; electric power information system ; Energy management ; Environmental management ; Information security ; Information systems ; Management information systems ; Power system security ; system management mode ; trusted chain ; trusted computer</subject><ispartof>2010 International Conference on Networking and Digital Society, 2010, Vol.1, p.212-215</ispartof><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/5479155$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,776,780,785,786,2052,27901,54894</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/5479155$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Ren Liu</creatorcontrib><creatorcontrib>Dongxiao Niu</creatorcontrib><title>Application research of trusted computing platform in electric power information system</title><title>2010 International Conference on Networking and Digital Society</title><addtitle>ICNDS</addtitle><description>In recent years, the rapid development of trusted computing with active defense ideas to solve security problem of computer and network system, and trusted computing is believed to be the most likely fundamentally solve the security of computer system. This paper puts forward an application scheme of trusted computing platform being used in electric power information system. According to security requirements of electric power information system, it designs a method of constructing dynamic trust chain based on system management mode (SMM), and makes dynamic measurement to system program and key application, in order to ensure operating system environment integrity and trusty, effectively defenses against malicious code, make great efforts to enhance power information system security defense capabilities.</description><subject>Application software</subject><subject>Computer networks</subject><subject>Computer security</subject><subject>Design methodology</subject><subject>electric power information system</subject><subject>Energy management</subject><subject>Environmental management</subject><subject>Information security</subject><subject>Information systems</subject><subject>Management information systems</subject><subject>Power system security</subject><subject>system management mode</subject><subject>trusted chain</subject><subject>trusted computer</subject><isbn>1424451620</isbn><isbn>9781424451623</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2010</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><recordid>eNotUNtKAzEUDEhBW_sD-pIf2HqSnGTNY6m3QtEHCz6WNHtWI3sjSZH-vVvaeRnODDMchrE7AQshwD6sV-9PnwsJ462xtELrKzYVKBG1MBImbCoBrFUIBq_ZPKVfGIFaGqlv2NdyGJrgXQ59xyMlctH_8L7mOR5Spor7vh0OOXTffGhcrvvY8tBxasjnGDwf-j-Ko3IyziXpOObaWzapXZNofuEZ2748b1dvxebjdb1abopgIRePpT89qYz0oA0qqIQ2ziqqURIIXe4RsFKCSO2VlyDJKCWRbGmBqPJqxu7PtYGIdkMMrYvH3WUH9Q-5U1J1</recordid><startdate>201005</startdate><enddate>201005</enddate><creator>Ren Liu</creator><creator>Dongxiao Niu</creator><general>IEEE</general><scope>6IE</scope><scope>6IL</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIL</scope></search><sort><creationdate>201005</creationdate><title>Application research of trusted computing platform in electric power information system</title><author>Ren Liu ; Dongxiao Niu</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-i90t-87c5162362c056430d156a93ef42e0157b404d31ee3b3c202e63324e9790eedc3</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2010</creationdate><topic>Application software</topic><topic>Computer networks</topic><topic>Computer security</topic><topic>Design methodology</topic><topic>electric power information system</topic><topic>Energy management</topic><topic>Environmental management</topic><topic>Information security</topic><topic>Information systems</topic><topic>Management information systems</topic><topic>Power system security</topic><topic>system management mode</topic><topic>trusted chain</topic><topic>trusted computer</topic><toplevel>online_resources</toplevel><creatorcontrib>Ren Liu</creatorcontrib><creatorcontrib>Dongxiao Niu</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE/IET Electronic Library (IEL)</collection><collection>IEEE Proceedings Order Plans (POP All) 1998-Present</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Ren Liu</au><au>Dongxiao Niu</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>Application research of trusted computing platform in electric power information system</atitle><btitle>2010 International Conference on Networking and Digital Society</btitle><stitle>ICNDS</stitle><date>2010-05</date><risdate>2010</risdate><volume>1</volume><spage>212</spage><epage>215</epage><pages>212-215</pages><isbn>1424451620</isbn><isbn>9781424451623</isbn><abstract>In recent years, the rapid development of trusted computing with active defense ideas to solve security problem of computer and network system, and trusted computing is believed to be the most likely fundamentally solve the security of computer system. This paper puts forward an application scheme of trusted computing platform being used in electric power information system. According to security requirements of electric power information system, it designs a method of constructing dynamic trust chain based on system management mode (SMM), and makes dynamic measurement to system program and key application, in order to ensure operating system environment integrity and trusty, effectively defenses against malicious code, make great efforts to enhance power information system security defense capabilities.</abstract><pub>IEEE</pub><doi>10.1109/ICNDS.2010.5479155</doi><tpages>4</tpages></addata></record>
fulltext fulltext_linktorsrc
identifier ISBN: 1424451620
ispartof 2010 International Conference on Networking and Digital Society, 2010, Vol.1, p.212-215
issn
language eng
recordid cdi_ieee_primary_5479155
source IEEE Electronic Library (IEL) Conference Proceedings
subjects Application software
Computer networks
Computer security
Design methodology
electric power information system
Energy management
Environmental management
Information security
Information systems
Management information systems
Power system security
system management mode
trusted chain
trusted computer
title Application research of trusted computing platform in electric power information system
url http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-24T14%3A30%3A59IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-ieee_6IE&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=Application%20research%20of%20trusted%20computing%20platform%20in%20electric%20power%20information%20system&rft.btitle=2010%20International%20Conference%20on%20Networking%20and%20Digital%20Society&rft.au=Ren%20Liu&rft.date=2010-05&rft.volume=1&rft.spage=212&rft.epage=215&rft.pages=212-215&rft.isbn=1424451620&rft.isbn_list=9781424451623&rft_id=info:doi/10.1109/ICNDS.2010.5479155&rft_dat=%3Cieee_6IE%3E5479155%3C/ieee_6IE%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-i90t-87c5162362c056430d156a93ef42e0157b404d31ee3b3c202e63324e9790eedc3%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=5479155&rfr_iscdi=true