Analysis of Trust Chain Transitivity in TCG

Article Preview

Abstract:

Trust chain is fundamental technology of Trusted Computing facing many problems. This paper points out that trust chain is made of two stages, analyses different trust relation building mechanism of two stages, and also thinks and proves that trust loss during trust transitivity process comes from composition loss and so on, describes behavior of trust chain transitivity quantitatively. After discussing key factors affect the trust, this paper defines the general trust transitivity model and trust loss measurement function, and discusses trust loss of Stage1 in TCG.

You might also be interested in these eBooks

Info:

Periodical:

Advanced Materials Research (Volumes 490-495)

Pages:

2042-2046

Citation:

Online since:

March 2012

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2012 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Shen Chang-Xiang, Zhang Huan-Guo, Wang Huai-Min. Reasearch and Development of Trusted Computing. Science in Chain: Information Sciences. 40(2)(2010) , pp.139-166, in Chinese.

Google Scholar

[2] Jiang Yi, Lv Weike, Liu Xiangbin. Research of trust chain improvement technology. 2010 Second International Conference on Networks Security, Wireless Communications and Trusted Computing. Wuhan, Hubei. (2010) , pp.294-297.

DOI: 10.1109/nswctc.2010.74

Google Scholar

[3] Stéphane Lo Presti. A tree of trust rooted in extended trusted computing. Advances in Computer Security and Forensics 2007 Conference. (2007) , p.13–20.

Google Scholar

[4] Chen Li, Ruihua Li , Lu Zhuang et al. Formal Analysis of Trust Chain. 2010 Second International Conference on Networks Security, Wireless Communications and Trusted Computing. Wuhan, Hubei, China. (2010) , p.111 – 116, in Chinese.

DOI: 10.1109/nswctc.2010.34

Google Scholar

[5] Li Xiaoyong, Han Zhen, Shen Changxiang. Transitive Trust and Performance Analysis in Windows Environment. Journal of Computer Research and Development. 44(11) (2007) , pp.1889-1895, in Chinese.

DOI: 10.1360/crad20071111

Google Scholar

[6] Riccardo Focardi, Roberto Gorrieri. A Classification of Security Properties for Process Algebras. JOURNAL OF COMPUTER SECURITY. (1994) , pp.5-33.

Google Scholar

[7] Noninterference and the composability of security properties. Proceedings of the IEEE Symposium on Security and Privacy, Oakland, CA , USA. (1988) , p.177 – 186.

DOI: 10.1109/secpri.1988.8110

Google Scholar

[8] Audun Jøsang, Roslan Ismail. The Beta Reputation System. Proceedings of the 15th Bled Electronic Commerce Conference e-Reality: Constructing the e-Economy, Bled, Slovenia. (2002) , pp.1-14.

Google Scholar