Study on Quality of Service Based on Trusted Computing

Article Preview

Abstract:

Trusted computing is a hot topic of information security technology research nowadays. It was developed based on computing and Information Systems. At the same time, business processes for e-commerce and Web service applications, suppliers and customers define a binding agreement or contract between the two parties, specifying quality of service (QoS) items such as products or services to be delivered, deadlines, quality of products, and cost of services. The management of QoS metrics directly impacts the success of organizations participating in e-commerce. In this paper, we discuss the present situation about QoS in the environment of trusted computing. It describes the factors related to each attribute, as well as possible tradeoffs and existing efforts to achieve that quality. The paper also discusses key issues in services level agreements that are used to contract the level of services quality between service providers and users.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

3941-3944

Citation:

Online since:

May 2014

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] Chris Mitchell, Trusted Computing, Institution of Electrical Engineers, (2005).

Google Scholar

[2] Stallman, Richard. Can You Trust Your Computer? (Gnu. org. Retrieved 12 August 2013).

Google Scholar

[3] Trusted Computing. http: /en. wikipedia. org/wiki/Trusted_Computing#References, (2014).

Google Scholar

[4] Liang-Jie Zhang and Jia Zhang, Services Computing, Tsinghua University Press, (2007).

Google Scholar

[5] Web Services Glossary, W3C. http: /www. w3. org, (2014).

Google Scholar

[6] Service-Oriented Architecture (SOA), http: /msdn. microsoft. com/en-us/library/bb833022. aspx.

Google Scholar

[7] WS-Security. http: /www. oasis-open. org/committees/wss.

Google Scholar

[8] Y. Huang, X. -Q. Ma and X. -Y. Zhou, An access control model based on Trusted Computing, Journal of Chongqing University of Arts and Sciences, (2010), 29(3): pp.54-57.

Google Scholar