Research on Trust Model Based on Behavior and Trusted Computing

被引:2
|
作者
Gu Yue-sheng [1 ]
Chen Jun [1 ]
Wang Yan-rong [1 ]
机构
[1] Henan Inst Sci & Technol, Xinxiang, Peoples R China
关键词
grid; trust model; behavior; trusted computing; domain; identity right;
D O I
10.4028/www.scientific.net/AMR.108-111.1259
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Trusted computing technology is a basic and entirely solution for security problems of computer. In order to solve the security problem caused by dynamics and the uncertainty of the grid environment, the article has put forward a new trust model based on behavior and trusted computing to deal with the trusting relationship among the entities, and take different methods to deal with to the trusting relationship between inner-domain and intra-domain based on the concept of Identity right, and a method for measuring and evaluating the behavior trust are provided.
引用
收藏
页码:1259 / 1263
页数:5
相关论文
共 50 条
  • [1] Research on Behavior Trust Based on Bayesian Inference in Trusted Computing Networks
    Liu, Wei
    Ci, Linlin
    Liu, Liping
    [J]. 2015 IEEE INTERNATIONAL CONFERENCE ON SMART CITY/SOCIALCOM/SUSTAINCOM (SMARTCITY), 2015, : 1134 - 1138
  • [2] Quantitative assignment of the grid behavior trust model based on trusted computing
    Liu, Lizhao
    Wei, Peng
    Wang, Ying
    Li, Maoqing
    [J]. Wuhan Daxue Xuebao (Xinxi Kexue Ban)/ Geomatics and Information Science of Wuhan University, 2010, 35 (05): : 587 - 590
  • [3] A Secure Trust Model Based on Trusted Computing
    Yin Zhixi
    [J]. 2009 INTERNATIONAL CONFERENCE ON E-BUSINESS AND INFORMATION SYSTEM SECURITY, VOLS 1 AND 2, 2009, : 170 - 176
  • [4] PKI Mesh Trust Model Based on Trusted Computing
    Liu, Changping
    Feng, Yong
    Fan, Mingyu
    Wang, Guangwei
    [J]. PROCEEDINGS OF THE 9TH INTERNATIONAL CONFERENCE FOR YOUNG COMPUTER SCIENTISTS, VOLS 1-5, 2008, : 1401 - 1405
  • [5] Research of Mobile Agent Trust Management Model in Trusted Computing Environment
    Chen, Aili
    Wu, Xiaoping
    [J]. 2010 6TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS NETWORKING AND MOBILE COMPUTING (WICOM), 2010,
  • [6] The research of Trusted Computing based on the model of trusted Meta data of BSCM
    Zhong, Liu
    [J]. 2008 FOURTH INTERNATIONAL CONFERENCE ON INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING, PROCEEDINGS, 2008, : 941 - 945
  • [7] A Trust Model for Heterogeneous Trusted Computing Architectures
    Zhu, Lu
    Yu, Sheng
    Zhang, Xing
    [J]. NSWCTC 2009: INTERNATIONAL CONFERENCE ON NETWORKS SECURITY, WIRELESS COMMUNICATIONS AND TRUSTED COMPUTING, VOL 2, PROCEEDINGS, 2009, : 539 - +
  • [8] Research of Trust Model in P2P Network Based on Trusted Computing0
    Rong, Li
    Lei, Li
    [J]. INTERNATIONAL CONFERENCE ON GRAPHIC AND IMAGE PROCESSING (ICGIP 2012), 2013, 8768
  • [9] Research on Trust Chain Model Based on Dual Trusted Measurement Mechanism
    Yuan, Depeng
    Lu, Chuan
    Wang, Yu
    [J]. 2010 INTERNATIONAL CONFERENCE ON INFORMATION, ELECTRONIC AND COMPUTER SCIENCE, VOLS 1-3, 2010, : 1423 - 1425
  • [10] A Trusted Remote Attestation Model based on Trusted Computing
    Yu, Yue
    Wang, Huaimin
    Liu, Bo
    Yin, Gang
    [J]. 2013 12TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2013), 2013, : 1504 - 1509