会议专题

Trusted Computing and Gene Identification Used in 3G Mobile E-Business System

Millions of people are enjoying the convenience of transferring money and shopping with mobile e-business,but at great risk. Because of the risk,security should be considered a fundamental aspect of e-business system design. Mobile wireless e-business system inherently possesses a higher degree of risk than wired e-business applications,and it requires greater level of security and trust. Special attention must be paid to the mobile e-business. With a wellestablished infrastructure of 3G system,and with the advent of trusted computing and gene identification technology,this kind of situation will be changed greatly. This paper introduces the trusted platform module,the gene theory and their possible application in the mobile e-business system. It proposes that gene identification (GI) module should be embedded in TPM (Trust Platform Module),3GTT (3G Trusted Terminal) and TC PC (Trust Computing PC) to ensure the trust of each node in the 3G mobile e-business system. It is a theoretically effective method to present the possibility of solving these security and trust issues.

Trusted computing Security 3G Mobile E-Business TPM Gene Identification

Liangyin Chen Zhishu Li Xuwei Li Xingshu Chen Hong Zhu Hu Jin Feng Yin

School of Computer Science,Sichuan University,Chengdu 610065,China Computer Science Department,Chengdu Univ.of Information Technology School of Computer Science,Southwest University for Nationalities

国际会议

The 2008 International Conference on Embedded Software and Systems Symposia(ICESS 2008)(2008国际嵌入式系统及嵌入式软件会议)

成都

英文

355-360

2008-01-01(万方平台首次上网日期,不代表论文的发表时间)