Trusted Software Construction Model Based on Trust Shell

被引:1
|
作者
Tian, Junfeng [1 ]
Zhu, Ye [1 ]
机构
[1] HeBei Univ, Coll Math & Comp Sci, Baoding, Peoples R China
关键词
Trusted Software Construction; Trust Shell; Software Behavior; Check Point; Scene;
D O I
10.4028/www.scientific.net/AMR.186.251
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Due to not considering the guaranty of trustiness, traditional software development methods and techniques lack effective measures for ensuring trustiness. Combining agent technique with trusted computing provided by TPM, a trusted software construction model based on Trust Shell (TSCMTS) is demonstrated in this paper, where Trust Shell is responsible for ensuring the trustiness of software logically. In particular, for the purpose of improving the accuracy of trustiness constraints, a strategy of determining multiple attributes' weights by information entropy for check point is proposed. Both simulation experiment results and practical application indicate that the TSCMTS is of effective trustiness and reasonable performance overhead.
引用
收藏
页码:251 / 255
页数:5
相关论文
共 50 条
  • [1] Trust Shell Based Constitution Model of Trusted Software
    Tian Junfeng
    Zhu Ye
    [J]. CHINA COMMUNICATIONS, 2011, 8 (04) : 11 - 22
  • [2] The Trust Management Model of Trusted Software
    Wu Jin
    Liao Yongjian
    Nie Xuyun
    Liu Mengjuan
    [J]. 2009 INTERNATIONAL FORUM ON INFORMATION TECHNOLOGY AND APPLICATIONS, VOL 3, PROCEEDINGS, 2009, : 534 - 537
  • [3] Construction of Trusted Routing Based on Trust Computation
    Gong, Bei
    Zhu, Jingxuan
    Wang, Yubo
    [J]. WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2021, 2021
  • [4] Construction of Internet of things trusted group based on multidimensional attribute trust model
    Chen, Jinghan
    Gong, Bei
    Wang, Yubo
    Zhang, Yu
    [J]. INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2021, 17 (01)
  • [5] A Secure Trust Model Based on Trusted Computing
    Yin Zhixi
    [J]. 2009 INTERNATIONAL CONFERENCE ON E-BUSINESS AND INFORMATION SYSTEM SECURITY, VOLS 1 AND 2, 2009, : 170 - 176
  • [6] Trusted Network Evaluation Model Based on Comprehensive Trust
    YIN Ansheng
    HUANG Haiping
    [J]. Chinese Journal of Electronics, 2021, 30 (06) : 1178 - 1188
  • [7] Research on Trust Model Based on Behavior and Trusted Computing
    Gu Yue-sheng
    Chen Jun
    Wang Yan-rong
    [J]. PROGRESS IN MEASUREMENT AND TESTING, PTS 1 AND 2, 2010, 108-111 : 1259 - 1263
  • [8] PKI Mesh Trust Model Based on Trusted Computing
    Liu, Changping
    Feng, Yong
    Fan, Mingyu
    Wang, Guangwei
    [J]. PROCEEDINGS OF THE 9TH INTERNATIONAL CONFERENCE FOR YOUNG COMPUTER SCIENTISTS, VOLS 1-5, 2008, : 1401 - 1405
  • [9] Trusted Opportunistic Routing Based on Node Trust Model
    Su, Bing
    Du, Chenhui
    Huan, Juan
    [J]. IEEE ACCESS, 2020, 8 : 163077 - 163090
  • [10] Trusted Network Evaluation Model Based on Comprehensive Trust
    Yin Ansheng
    Huang Haiping
    [J]. CHINESE JOURNAL OF ELECTRONICS, 2021, 30 (06) : 1178 - 1188