Home            Contact us            FAQs
    
      Journal Home      |      Aim & Scope     |     Author(s) Information      |      Editorial Board      |      MSP Download Statistics

     Advance Journal of Food Science and Technology


Study on Traceability System of Athletes Food Safety Based on Trusted Computing

1Hongjiang Wu and 2Haiyan Zhao
1Department of Sports, Northwest University, Xi’an 710069, China
2Department of Network Service, Xi’an Communication Institute, Xi’an 710106, China
Advance Journal of Food Science and Technology  2015  12:890-894
http://dx.doi.org/10.19026/ajfst.8.2726  |  © The Author(s) 2015
Received: January ‎19, ‎2015  |  Accepted: ‎February ‎14, ‎2015  |  Published: July 20, 2015

Abstract

How to effectively prevent food contamination and foodborne diseases and the incidence of foodborne doping is one of the issues of the majority of coaches and athletes, which are of most concern. In the traditional food safety traceability system, how to ensure the information transfer process will be a difficult problem to solve. In this study, the trusted computing theory is applied to computer software system and it also proposes the thinking of three flow integration on athlete’s food safety traceability system. Taking meat for an example, this study also proposes the thinking of multi-layer software architecture system as a whole and messaging security, etc.

Keywords:

Athlete, food safety, traceability system, trusted computing,


References

  1. Chen, Y., 2006. Study on trusted computing model and architecture. Ph.D. Thesis, Wuhan University, Wuhan, China.
  2. Goguen, J. and J. Meseguer, 1982. Security policies and security models. Proceeding of the IEEE Symposium on Security and Privacy. IEEE Computer Society Press, Oakland, California, pp: 11-20.
    CrossRef    
  3. Liang, T., 2008. Based on the trusted computing platform of trust chain is reviewed. Comput. Sci., 35(10): 15-18.
  4. Luan, Y.Q., Y.N. Zhang and X.Z. Wang, 2012. Clenbuterol and athlete food safety. China Sports Coaches, 2: 38-39.
  5. Ma, J.P., X.X. Yu and F. Hong, 1997. A complete no interference model. 20(11): 1034-1037.
  6. Shen, C.X. and H.G. Zhang, 2007. Overview of cyber security. Sci. China, 37: 129-150.

Competing interests

The authors have no competing interests.

Open Access Policy

This article is distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution, and reproduction in any medium, provided you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license, and indicate if changes were made.

Copyright

The authors have no competing interests.

ISSN (Online):  2042-4876
ISSN (Print):   2042-4868
Submit Manuscript
   Information
   Sales & Services
Home   |  Contact us   |  About us   |  Privacy Policy
Copyright © 2024. MAXWELL Scientific Publication Corp., All rights reserved