Dissertation > Excellent graduate degree dissertation topics show

Design and Implementation of a Trusted Computing Based Java Card Virtual Machine

Author: ZhouTao
Tutor: FangYong
School: Xi'an University of Electronic Science and Technology
Course: Computer System Architecture
Keywords: Java smart card Trusted computing technology The credibility of the amount The Java Smart Kaka inside the virtual machine
CLC: TP309
Type: Master's thesis
Year: 2008
Downloads: 138
Quote: 2
Read: Download Dissertation

Abstract


Java smart card technology and trusted computing technology are two main research directions in the field of information security . On the one hand , Java smart card with its unique multi-application , more and more attention by the industry , and can be widely used . At the same time , Java smart card multi- application also raises security issues . Currently there have been a variety of computing environments for Java smart card attacks a certain extent , these insecurity hampered further popularization and application of Java smart cards . On the other hand , in order to enhance the security of the existing PC terminal architecture , the Trusted Computing Group (Trusted Computing Group, referred to as the TCG) was established in 1999 , also launched its Trusted Computing technology specification , its purpose is to establish the root of trust and the mechanism of credibility quantity , and strive in the the existing untrusted PC environment to establish a trusted computing environment . However, due to the current lack of trusted computing technology - based operating system , therefore , the current trusted computing technologies in the practical application of the same faces some difficult technical problem . This thesis is based on analysis and research of these two technologies , the exploration of trusted computing technology to improve the introduction to the Java Smart Card virtual machine computing environment security envisaged Java smart cards , and as a basis for design and the development of a Java smart card -based trusted computing technologies within the virtual machine .

Related Dissertations

  1. The Integration Research, Design and Application of JAVA Smart Card Based on the RMI Technology,TN409
  2. Design and Implementation of JAVA Card Debugging Platform,TP311.52
  3. The Design and Implementation of Java Card Software Platform,TN409
  4. The Research on JCVM Performance Optimization,TN409
  5. Study and Implementation of Secure E-ticket System Based on NFC,TP393.08
  6. Research about Some Problems on Trusted Internetware Measurement in the Environment of Internet,TP311.53
  7. Programe Based on JC3 Classic Virtual Machine Running Time Eslimated,TN409
  8. Research and Implementation of a Secure Applet Downloading Mechanism on Java Smart Card,TP393.08
  9. Trusted Java-based smart card key management analysis and implementation,TP393.08
  10. Research and Implementation of Bytecode Verification Algorithm on the Java Card,TN409
  11. Research on the Assurance Mechanism and the Evaluation Method for Trustworthy of Business Component,TP311.52
  12. The Research and Implementation of Java Card Bytecode Optimization,TN409
  13. The network credibility quantity Research and Implementation mechanism,TP393.08
  14. Design and Implementation of Multi-Meter Application Online Transaction System Based on Java Card,TP311.52
  15. Application and Research of the Trusted Measurement Mechanism on Trusted Computing Platform,TP393.08
  16. Java smart card security analysis and research,TN409
  17. Analysis and Implementation of Trusted Measurement Mechanism Based on Java Smart Card,TP393.08
  18. Java smart card library Research and Implementation,TP311.52
  19. Trusted Java-based smart card authentication technology Research and Implementation,TP309
  20. Design and Implementation of Windows Kernel-mode Cryptographic Service Interface,TP309.7
  21. The Design and Implementation of Security Mechanism of Embedded Dependable Computer,TP309

CLC: > Industrial Technology > Automation technology,computer technology > Computing technology,computer technology > General issues > Security and confidentiality
© 2012 www.DissertationTopic.Net  Mobile