JSR 321 Trusted Computing API for Java .pdf

JSR 321 Trusted Computing API for Java .pdf

ID:33939124

大?。?.89 MB

頁數(shù):34頁

時間:2019-02-28

JSR 321 Trusted Computing API for Java .pdf_第1頁
JSR 321 Trusted Computing API for Java .pdf_第2頁
JSR 321 Trusted Computing API for Java .pdf_第3頁
JSR 321 Trusted Computing API for Java .pdf_第4頁
JSR 321 Trusted Computing API for Java .pdf_第5頁
資源描述:

《JSR 321 Trusted Computing API for Java .pdf》由會員上傳分享,免費在線閱讀,更多相關內(nèi)容在學術論文-天天文庫

1、Ins%tute?for?Applied?Informa%on?Processing?and?Communica%ons?(IAIK),?Graz?University?of?Technology?,?Austria?JSR321:TrustedComputingAPIforJavaRonaldToeglWernerKeil?????Werner?Keil?and?Ronald?ToeglJavaOne?2011?????????JSR?321?1?Ins%tute?for?Applied?Informa%on?Processing?and?Communica%ons?(IAIK

2、),?Graz?University?of?Technology?,?Austria?Agenda?StatusintheJavaCommunityProcess?TrustedComputingIntroduction?RequirementsandgoalsfortheAPI?Packagestructure?Codeexamples?Discussion?????Werner?Keil?and?Ronald?ToeglJavaOne?2011?????????JSR?321?2?Ins%tute?for?Applied?Informa%on?Processing?and?C

3、ommunica%ons?(IAIK),?Graz?University?of?Technology?,?Austria?PlatformIndependence&Trust?Manyapplicationsusetheplatform-independentruntimeenvironmentsofJava?,especiallyinmarketswheresecuritymatters.?TCG’sTrustedComputing(TC)promisestoovercomemanyofthecriticalsecurityissuesusingtheTrustedPlatfo

4、rmModule(TPM).WithJSR321therewillsoonbeauniform,standardwaytoaccessTCservicesoftheplatformfromJavaapplications.?????Werner?Keil?and?Ronald?ToeglJavaOne?2011?????????JSR?321?3?Ins%tute?for?Applied?Informa%on?Processing?and?Communica%ons?(IAIK),?Graz?University?of?Technology?,?Austria?JSR321Jav

5、aSpecificationRequest#321(JSR321)willbetheTrustedComputingAPIforJava.TheExpertGroupiscurrentlydesigning,implementingandstandardizingitintheJavaCommunityProcess.EGmembersfromIAIKOracleSamsungUniv.KlagenfurtCSRDU,PakistanPortakal,TurkeyUniv.ofCambridgeCatmediaX-MAS2007Summer200920102011?????Wer

6、ner?Keil?and?Ronald?ToeglJavaOne?2011?????????JSR?321?4?Ins%tute?for?Applied?Informa%on?Processing?and?Communica%ons?(IAIK),?Graz?University?of?Technology?,?Austria?TrustedComputingTheoretical“perfectsecurity”cannotbereachedinpractise.But,a“trustedsystem”just?behavesintheexpectedmannerforapar

7、ticularpurpose“.TrustedComputingisaparadigmtoaddsomepracticalsecuritytooff-the-shelfcomputers.TheTrustedComputingGroup(TCG)specifiestechnologies.?????Werner?Keil?and?Ronald?ToeglJavaOne?2011?????????JSR?321?5?Ins%tute?for?Applied?Informa%on?P

當前文檔最多預覽五頁,下載文檔查看全文

此文檔下載收益歸作者所有

當前文檔最多預覽五頁,下載文檔查看全文
溫馨提示:
1. 部分包含數(shù)學公式或PPT動畫的文件,查看預覽時可能會顯示錯亂或異常,文件下載后無此問題,請放心下載。
2. 本文檔由用戶上傳,版權歸屬用戶,天天文庫負責整理代發(fā)布。如果您對本文檔版權有爭議請及時聯(lián)系客服。
3. 下載前請仔細閱讀文檔內(nèi)容,確認文檔內(nèi)容符合您的需求后進行下載,若出現(xiàn)內(nèi)容與標題不符可向本站投訴處理。
4. 下載文檔時可能由于網(wǎng)絡波動等原因無法下載或下載錯誤,付費完成后未能成功下載的用戶請聯(lián)系客服處理。