Journal Home Online First Current Issue Archive For Authors Journal Information 中文版

Strategic Study of CAE >> 2016, Volume 18, Issue 6 doi: 10.15302/J-SSCAE-2016.06.011

The Strategy of TC 3.0: A Revolutionary Evolution in Trusted Computing

Center of Information Security Architecture in Beijing Jiaotong University, Beijing 100044, China

Funding project:中国工程院重大咨询项目“网络空间安全战略研究”(2015-ZD-10) Received: 2016-10-12 Revised: 2016-10-18 Available online: 2016-12-13 15:28:28.000

Next Previous

Abstract

This paper introduces the status, problems, and future strategies of the traditional defense system and analyzes issues in the current protection structure. We then propose the trusted computing (TC) 3.0 strategy, which is an active defense architecture based on active immunity. Furthermore, we give an example of TC 3.0 in cloud computing and provide some suggestions on enforcing active defense.

Figures

Fig. 1.

Fig. 2.

References

[ 1 ] Shen C X. Construction of the active defense and comprehensive prevention protection system [J]. Information Security and Com-munications Privacy, 2004, 2 (5):1–3. Chinese. link1

[ 2 ] China Internet Network Information Center (CNNIC). The 38th statistical report on internet development in China [EB/OL]. (2016-08-03) [2016-10-08]. http://www.cnnic.net.cn/hlwfzyj/hl-wxzbg/hlwtjbg/201608/t20160803_54392.htm. Chinese. link1

[ 3 ] Shen C X. Cloud computing security and hierarchical protection [J]. Information Security and Communications Privacy, 2012 (1): 16–17. Chinese. link1

[ 4 ] Shen C X. Building a defense security system with trusted com-puting [J]. Information Security and Communications Privacy, 2016 (6): 34–34. Chinese. link1

[ 5 ] Shen C X, Zhang H G, Wang H M, et al. Research and develop-ment of trusted computing [J]. Scientia Sinica Informationis, 2010, 40 (2): 139–166. Chinese. link1

[ 6 ] Zhang W L. Discussion the status of information security base on graded protection [J]. Information Security and Technology, 2014 (9): 9–13. Chinese. link1

[ 7 ] Song Y W, Ma Q D, Zhang J. Information security level protection policies and standard system [J]. Information and Communications Technologies, 2010, 4 (6): 58–63. Chinese. link1

[ 8 ] Shen C X. The rectification routes of hierarchical protection [J]. Netinfo Security, 2008 (11): 14–15. Chinese. link1

[ 9 ] Shen C X. Developing the trusted computing technology and industry [J]. Information Security and Communications Privacy, 2007 (9): 19–21. Chinese. link1

[10] Shen C X. The Security of Cloud Computing [J]. Information Se-curity and Communications Privacy, 2010 (12): 12. Chinese. link1

[11] Shen C X. Independent innovation to accelerate the development of trusted computing [J]. Network and Computer Security, 2006 (6): 2–4. Chinese. link1

[12] Shen C X. Building a cyberspace security system with trusted computing [J]. China Information, 2015 (11): 33–34. Chinese. link1

Related Research