Trusted Software Construction Model Based on Trust Shell

Article Preview

Abstract:

Due to not considering the guaranty of trustiness, traditional software development methods and techniques lack effective measures for ensuring trustiness. Combining agent technique with trusted computing provided by TPM, a trusted software construction model based on Trust Shell (TSCMTS) is demonstrated in this paper, where Trust Shell is responsible for ensuring the trustiness of software logically. In particular, for the purpose of improving the accuracy of trustiness constraints, a strategy of determining multiple attributes’ weights by information entropy for check point is proposed. Both simulation experiment results and practical application indicate that the TSCMTS is of effective trustiness and reasonable performance overhead.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

251-255

Citation:

Online since:

January 2011

Authors:

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2011 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Huowang Chen, Ji Wang, Wei Dong: High Confidence Software Engineering Technologies. ACTA ELETRONIC SINICA, (2003).

Google Scholar

[2] Hong Mei, Xizhe Liu: Software techniques evolved by the Internet: Current situation and future trend. Chinese Sci Bull, (2010).

Google Scholar

[3] Yanwen Qu: Software Behavior, Beijing, Electronic Industry Press, (2004).

Google Scholar

[4] Huimin Lin, Wenhui Zhang: Model Checking: Theories, Techniques and Applications. ACTA ELECTRONICA SINICA, (2002).

Google Scholar

[5] Jing Liu, Jifeng He et al.: A strategy for model construction and integration in MDA, (2006).

Google Scholar

[6] Information on Https: /www. trustedcomputinggroup. org/groups/TCG_1_0_Architecture_Over view. pdf.

Google Scholar

[7] David Challener, Kent Yoder et al: A Practical Guide to Trusted Computing, (2009).

Google Scholar

[8] Changxiang Shen, Huanguo Zhang, Huaimin Wang: Research on trusted computing and its development. SCIENCE CHINA Information Sciences, (2010).

Google Scholar

[9] Cover T M. and Thomas, J A: Elements of Information Theory, New York, (1991).

Google Scholar

[10] M. Christodorescu, S. Jha: Static analysis of executables to detect malicious patterns, (2003).

DOI: 10.21236/ada449067

Google Scholar

[11] L. Wendehals: Improving Design Pattern Instance Recognition by Dynamic Analysis. In Proc. of the ICSE 2003 Workshop on Dynamic Analysis, (2003).

Google Scholar