| 1. | Agents and peer - to - peer computing , melbourne , australia , 2004 , lecture notes in computer science , 2872 : 23 - 34 . 26 felten e w . understanding trusted computing : will its benefits outweigh its drawbacks ? ieee security privacy magazine , 2003 , 1 : 60 - 62 网络的可信性要求保证网络和用户的行为是可预期和可管理的,要求实现对网络行为动态过程的分析及闭环控制,保障系统的安全信任和自愈等问题。 |