Construction of the Information Security Infrastructure Based on Trusted Computing

Chang-xiang SHEN,Xing-shu CHEN
DOI: https://doi.org/10.15961/j.jsuese.2014.01.032
2014-01-01
Abstract:According to the revelation of American cyberspace security strategy, the main task and challenges of information security in China were described. In terms of strengthening the construction of information security system, trusted computing system framework, the innovation and development of trusted computing and so on, how to use trusted computing for actively build a deep defense system and the innovation of the construction process of this system were elaborated. Finally, some suggestions in defence of sovereignty for cyberspace, independent research and development, network security frame, personnel training and development treads were put forward.
What problem does this paper attempt to address?