期刊文献+

基于模糊集合的完整性信任度评估模型 被引量:3

Integrity trust degree evaluation models based on fuzzy set
下载PDF
导出
摘要 完整性度量是可信计算得以实现的一项重要技术。根据影响操作系统完整性的内核模块、二进制可执行文件等因素,通过定义直接信任度、间接信任度和综合信任度等计算公式构建了一个操作系统的完整性信任度评估模型,该模型利用模糊集合理论将完整性度量化为[0,1]之间的具体数值,并根据隶属函数将操作系统的信任度划分为四个信任等级。该模型改变了原有完整性度量中一致执行、不一致停止的二值状态,为远程验证者提供较为精确的操作系统完整性度量值,提高了系统的可用性。仿真实验结果表明该模型较客观地提供了操作系统的完整性信息。 Integrity measurement is an important technology to meet the requirements of Trusted Computing.According to various kinds of elements which influence the integrity of operating system,a trust degree evaluation model is constructed based on the computing formulas of direct trust degree,indirect trust degree and overall trust degree.With fuzzy set theory,this model quantifies the integrity measurement values between [0,1].Using membership function,the operating system's trust degree can be divided into four trust levels,but not the false or true judgement method in current integrity measurement model.This method can supply more precise integrity state of computing platform for remote verifier and improve the usability of compute system.The simulation results show that the model gives more objective integrity information of the operating system.
出处 《计算机工程与应用》 CSCD 北大核心 2010年第24期77-80,共4页 Computer Engineering and Applications
基金 国家自然科学基金重点项目(No.60633020) 西安电子科技大学计算机网络与信息安全教育部重点实验室开放课题(No.2007CNIS-06)~~
关键词 信任度 完整性 模糊集合 trust degree integrity fuzzy set
  • 相关文献

参考文献16

  • 1Trusted Computing Group.TCG specification architecture overview[EB/OL].Revision 1.4 : 5 - 10. (2007-08) .http ://www.trustedcomputinggrouporg/.
  • 2Trusted Computing Group.TCG IWG architecture Part II[EB/OL]. Specification Version 1.0, October 2006 : 8-20.http ://www.trustedcomputinggroup.org/.
  • 3Trusted Computing Group.Trusted Network Connect(TNC) architecture[S].Specification Version 1.1,TCG Published,May 2006.
  • 4Sailer R, Jaeger T,Zhang Xiao-lan,et al.Attestation-based policy enforcement for remote access[C]//llth ACM Conference on Computer and Communications Security(CCS),October,2004.
  • 5Ray I.An interoperable context sensitive model of trust[J],J Intell Inf Syst,2009,32:75-104.
  • 6Meng Xiang-yi,Zhang Guang-wei.A new subjective trust model based on cloud model[C]//IEEE International Conference Networking, Sensing and Control, ICNSC 2008, April 2008 : 1125-1130.
  • 7Josang A, Ismail R, Boyd C.A survey of trust and reputation systems for online service provision[J].Preprint of Article Published in Decision Support Systems, 2007,43 (2) : 618-644.
  • 8Cui Wen-jing, Wang Hai-yang, Sui Qi, et al.Trust management model and evaluation method for online travel[C]//LNCS 5236: CSCWD 2007,2008:477-487.
  • 9Sailer R.Design and implementation of a TCG-based integrity measurement architecture[C]//13th Usenix Security Symposium, San Diego,California,August 2004.
  • 10Trcek D.Towards trust management standardization[S].Computer Standards and Interfaces,2004: 543-548.

二级参考文献10

  • 1郑宇,何大可,何明星.基于可信计算的移动终端用户认证方案[J].计算机学报,2006,29(8):1255-1264. 被引量:40
  • 2李小勇,桂小林.大规模分布式环境下动态信任模型研究[J].软件学报,2007,18(6):1510-1521. 被引量:138
  • 3TCG. TPM Work Group [EB/OL]. https: //www. trustedcomputinggroup. org/groups/tpm/, 2007-10
  • 4Microsoft. Next-Generation Secure Computing Base home page [EB/OL]. http://www. microsoft. com/resources/ngscb, 007-01
  • 5Intel. LaGrande Technology Architectural Overview [EB/OL]. http://www. intel. com/teehnology/security/downloads/LT_ Arch_Overview. pdf, 2007-01
  • 6Alan Z. Coming soon to VMware, Microsoft, and Xen: AMD Virtualization Technology Solves Virtualization Challenges [EB/OL]. http://www. devx.com/amd/Artide/30186,2007-01
  • 7JΦsang A. A Subjective Metric of Authentication//Proceedings of the European Symposium on Research in Security (ESORICS'98). Louvain-la-Neuve, Belgium, 1998:329-344
  • 8Patel J, Teacy W T, Luke, et al. A Probabilistic Trust Model for Handling Inaccurate Reputation Sources//Proceedings of Trust Management Third International Conference (iTrust 2005). INRIA-Rocquencourt, France, 2005:193-209
  • 9TCG. TCPA Main Specification version 1. 1 b [EB/OL]. https://www. trustedcomputinggroup. org/specs/TPM/TCPA_ Main_TCG_Architecture_v1_1b. pdf, 2007-10
  • 10余发江,张焕国.可信安全计算平台的一种实现[J].武汉大学学报(理学版),2004,50(1):69-73. 被引量:22

共引文献17

同被引文献24

引证文献3

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部