IBM / TPM / AMD / Intel / Microsoft / Secure Systems / Trusted Computing Group / /
Country
China / Singapore / /
Currency
pence / / /
Event
FDA Phase / /
Facility
Peking University / Key Laboratory of High Confidence Software Technologies / Institute of Software / /
IndustryTerm
security chip / trust chain / storage devices / large software systems / security services / data management / model process management / upper layer applications / software system design / computing / Process management layer applications / above services / software attacks / process management / /
Organization
Peking University / Science Fund for Creative Research Groups of China / National Natural Science Foundation of China / Key Laboratory of High Confidence Software Technologies / U.S. Securities and Exchange Commission / School of EECS / Ministry of Education / Institute of Software / No.2009AA01Z139 / and National Natural Science Foundation of China / /
Person
Hong Mei / T ER / Liang Gu / /
Position
model the trusted computing / driver / VP / adversary model / the security property analysis / CPN model for process management / guard / sys rt / corresponding guard / bt and sys rt / sys_ter sys_rt / rt / Private / corresponding author / /
Product
Logic / /
Technology
Confidence Software Technologies / virtual machine / RAM / public key / data encryption / private key / simulation / operating system / digital signature / security chip / operating systems / /