期刊文献+

可信链的随机进程代数模型

Modeling trust chain with stochastic process algebra
在线阅读 下载PDF
导出
摘要 计算终端引导过程的可信链表现为顺序性,在运行过程中可信链表现出随机性。相关研究工作以计算终端引导过程的可信链建模为主。以随机进程代数为形式化描述语言,建立了一种可信链模型来描述计算终端运行过程的信任传递。该模型在随机进程代数的语法中扩展了完整性属性和完整性度量概率,建立了信任传递的语义规则,并提出了基于随机进程代数的可信链语义模型。该模型对于进一步研究可信链和计算终端的完整性具有一定的参考价值。 Trust chain is one key research in trusted computing ( TC). Trust chain exhibits ordinal property in the course of computing terminal's boot and stochastic property during running. This paper proposed a trust chain model based on stochastic process algebra ( SPA) to reason trust transfer. This model firstly extended syntax of SPA to meet trust chain specification. Secondly,addressed trust transfer rules in this model. These rules specified the prerequisites of trust transfer. At last,suggested a semantic model of trust chain with SPA. This model is quoteworthy to the research of maintaining trust chain and integrity of computing terminal.
出处 《计算机应用研究》 CSCD 北大核心 2010年第12期4650-4653,共4页 Application Research of Computers
基金 国家"863"计划资助项目(2009AA01Z403 2009AA01Z435)
关键词 可信链 可信计算 随机进程代数 软件行为 形式化方法 trust chain trusted computing stochastic process algebra software behavior formalization methodology
  • 相关文献

参考文献19

  • 1Trusted Computing Group.TPM work group[EB/OL].[2010-04-20].https://www.trustedcomputinggroup.org/ groups/tpm.
  • 2中国国家密码管理局.可信计算密码支撑平台功能与接口规范[EB/OL].[2008-11-25].http://www.oscca.gov.cn/Doc/6/News_1132.htm.
  • 3CHEN Shuyi WEN Yingyou ZHAO Hong.Modeling Trusted Computing[J].Wuhan University Journal of Natural Sciences,2006,11(6):1507-1510. 被引量:3
  • 4CHEN Shu-yi,WEN Ying-you,ZHAO Hong.Formal analysis of secure bootstrap in trusted computing[C] // Proc of the 4th Internatio-nal Conference on Autonomic and Trusted Computing.Berlin:Springer,2007:352-360.
  • 5赵佳,沈昌祥,刘吉强,韩臻.基于无干扰理论的可信链模型[J].计算机研究与发展,2008,45(6):974-980. 被引量:29
  • 6ZHANG Bei,CHEN Chen,ZHU Jian-yong.The transfer of trust-chain with damp[C] //Proc of the 3rd International Conference on IEEE Pervasive Computing and Applications.Piscataway,NJ:IEEE Press,2008:948-952.
  • 7JOSANG A,POPE S.Semantic constraints for trust transitivity[C] //Proc of the 2nd Asia-Pacific Conference on Conceptual Modelling.Darlinghurst,Australia:Australian Computer Society Inc,2005:59-48.
  • 8HUANG J W,FOX M S.An ontology of trust:formal semantics and transitivity[C] //Proc of the 8th International Conference on Electronic Commerce.New York:ACM Press,2006:259-270.
  • 9TAHENAN M,JALILI R,AMINI M.A semantic-aware ontology-based trust model for pervasive computing environments[C] //Proc of the 5th International Conference on Autonomic and Trusted Computing.Berlin:Springer,2008:47-59.
  • 10DONG Chang-yu,RUSSELLO G,DULAY N.Trust transfer in distributed systems[C] //Proc of International Conference on Federation for Information Processing.Boston:Springer,2007:17-29.

二级参考文献31

共引文献32

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部