A Trust Model for Heterogeneous Trusted Computing Architectures

被引:0
|
作者
Zhu, Lu [1 ]
Yu, Sheng [2 ]
Zhang, Xing [3 ]
机构
[1] Wuhan Univ, Sch Comp, Wuhan 430072, Peoples R China
[2] Zhengzhou Univ, Inst Elect Technol, Informat Engn, Zhengzhou, Peoples R China
[3] Beijing Univ Technol, Trusted Comp Lab, Beijing, Peoples R China
来源
NSWCTC 2009: INTERNATIONAL CONFERENCE ON NETWORKS SECURITY, WIRELESS COMMUNICATIONS AND TRUSTED COMPUTING, VOL 2, PROCEEDINGS | 2009年
关键词
trust; trust model; identity authentication; integrity measurement;
D O I
10.1109/NSWCTC.2009.142
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Chinese specification for trusted computing [7] has adopted a different cryptography scheme from specifications released by trusted computing group (TCG) [1]. Although the two sets of specifications are functional compatible, it is hard for different platforms which conform to different specifications to trust each other. This paper proposes a trust model which includes meanings of both behavior trust and identity trust to establish a trust relationship for heterogeneous trusted computing architectures.
引用
收藏
页码:539 / +
页数:2
相关论文
共 50 条
  • [1] A Secure Trust Model Based on Trusted Computing
    Yin Zhixi
    2009 INTERNATIONAL CONFERENCE ON E-BUSINESS AND INFORMATION SYSTEM SECURITY, VOLS 1 AND 2, 2009, : 170 - 176
  • [2] Trusted Heterogeneous Disaggregated Architectures
    Koshiba, Atsushi
    Gust, Felix
    Pritzi, Julian
    Vahldiek-Oberwagner, Anjo
    Santos, Nuno
    Bhatotia, Pramod
    PROCEEDINGS OF THE 14TH ACM SIGOPS ASIA-PACIFIC WORKSHOP ON SYSTEMS, APSYS 2023, 2023, : 72 - 79
  • [3] Research on Trust Model Based on Behavior and Trusted Computing
    Gu Yue-sheng
    Chen Jun
    Wang Yan-rong
    PROGRESS IN MEASUREMENT AND TESTING, PTS 1 AND 2, 2010, 108-111 : 1259 - 1263
  • [4] PKI Mesh Trust Model Based on Trusted Computing
    Liu, Changping
    Feng, Yong
    Fan, Mingyu
    Wang, Guangwei
    PROCEEDINGS OF THE 9TH INTERNATIONAL CONFERENCE FOR YOUNG COMPUTER SCIENTISTS, VOLS 1-5, 2008, : 1401 - 1405
  • [5] Trusted Computing Architectures for IoT Devices
    Braeken, An
    da Silva, Bruno
    Segers, Laurent
    Knoedtel, Johannes
    Reichenbach, Marc
    Wulf, Cornelia
    Pertuz, Sergio
    Goehringer, Diana
    Vliegen, Jo
    Rabbani, Md Masoom
    Mentens, Nele
    APPLIED RECONFIGURABLE COMPUTING. ARCHITECTURES, TOOLS, AND APPLICATIONS, ARC 2024, 2024, 14553 : 241 - 254
  • [6] The trust measurement scheme in trusted computing
    Zhang, Li-Qiang
    Zhang, Huan-Guo
    Zhang, Fan
    Beijing Gongye Daxue Xuebao/Journal of Beijing University of Technology, 2010, 36 (05): : 586 - 591
  • [7] Enforcing trust in pervasive computing with trusted computing technology
    Li, Shiqun
    Balfe, Shane
    Zhou, Jianying
    Chen, Kefei
    CRITICAL INFORMATION INFRASTRUCTURES SECURITY, 2006, 4347 : 195 - +
  • [8] Quantitative assignment of the grid behavior trust model based on trusted computing
    Liu, Lizhao
    Wei, Peng
    Wang, Ying
    Li, Maoqing
    Wuhan Daxue Xuebao (Xinxi Kexue Ban)/ Geomatics and Information Science of Wuhan University, 2010, 35 (05): : 587 - 590
  • [9] Research of Mobile Agent Trust Management Model in Trusted Computing Environment
    Chen, Aili
    Wu, Xiaoping
    2010 6TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS NETWORKING AND MOBILE COMPUTING (WICOM), 2010,
  • [10] Solder-Defined Architectures for Trusted Computing
    Abel, Marc W.
    PROCEEDINGS OF THE 2021 IEEE NATIONAL AEROSPACE AND ELECTRONICS CONFERENCE (NAECON), 2021, : 246 - 253