全部 标题 作者
关键词 摘要

OALib Journal期刊
ISSN: 2333-9721
费用:99美元

查看量下载量

相关文章

更多...

可信计算中的可信度量机制

Keywords: 可信度量,完整性度量,可信计算

Full-Text   Cite this paper   Add to My Lib

Abstract:

为了解决可信计算中完整性度量架构过于复杂、难以扩展以及没有体现行为可信的问题,在分析完整性度量机制的基础上,对可信的概念进行扩展,引入信任度量机制,依据可信度量的需求和目标,给出需求导向、多目标融合的度量对象树模型以及对应的可信度量模型,通过与完整性度量模型的分析对比,可信度量模型能给出综合性的可信评估结果,具有可灵活扩展的特点,更加符合可信度量的实际需求.

References

[1]  SADEGHI A R,STUBLE C.Property-based attestation for computing platforms:caring about properties,not mechanisms[C]∥Proceedings of the 2004 workshop on New security paradigms.New York:ACM,2004:67-77.
[2]  GEOFFREY S,MALCOLM D,SIGI G.TCG Infrastructure Working Group Architecture Part II-Integrity Management[EB/OL].(2006-11-17)[2009-06-10].http:∥www.trustedcomputinggroup.org/files/resource_files/87651761-1D09-3519-AD6C5B3E41547285/IWG_ArchitecturePartII_v1.0.pdf
[3]  张立强.可信网络连接的一些理论与关键技术研究[D].武汉:武汉大学计算机学院,2008.ZHANG Li-qiang.Research on some theories and key technologies of trusted network connection[D].Wuhan:ComputerSchool,Wuhan Univeristy,2008.(in Chinese)
[4]  SAATY TL.The Analytic Hierarchy Process[M].New York:McGraw-Hill Book Company,1980:32-54.
[5]  MARCHESINI J,SMITH S W,WILD O,et al.How I Learned to Stop Worrying and Love the Bear.Techinial ReportTR2003-476[EB/OL].(2003-12-15)[2009-06-10].http:∥www-inst.eecs.berkeley.edu/~cs161/fa08/papers/tcg.pdf.
[6]  REINER S,ZHANG Xiao-lan,TRENT J,et al.Design and Implementation of a TCG-based Integrity MeasurementArchitecture[C]∥Proceedings 13th USENIX Security Symposium.Berkerly:USENIX Association,2004:223-238.
[7]  TRENTJ,REINER S,UMESH S.PRIMA:Policy-Reduced Integrity Measurement Architecture[C]∥Proceedings of the11th ACM Symposium on Access Control Models and Technologies.NewYork:ACM,2006:19-28.
[8]  KUHN U,SELHORST M,STUBLE C.Realizing property-based attestation and sealing with commonly available hard-andsoftware[C]∥Proceedings of 2nd ACM Workshop on Scalable Trusted Computing.NewYork:ACM,2007:50-57.
[9]  STEPHENP M.Formalizing Trust as a Computational Concept[D].UK:Department of Computing Science and Mathematics,University of Stirling,1994:19-80.
[10]  MUI L,MOHTASHEMI M,HALBERSTADT A.A computational model of trust and reputation for e-businesses[C]∥Proceedings of the 35th Hawaii International Conference on System Science(HICSS).NewYork:IEEE,2002:2431-2439.
[11]  BETHT,BORCHERDING M,KLEIN B.Valuation of trust in open network[C]∥Proceedings of the European Symposiumon Research in Security(ESORICS).Brighton:Springer-Verlag,1994:3-18.
[12]  AUDUN J.A logic for uncertain probabilities[J].International Journal of Uncertainty,Fuzziness and Knowledge-BasedSystems,2001,9(3):279-311.

Full-Text

Contact Us

service@oalib.com

QQ:3279437679

WhatsApp +8615387084133