The Trust Management Model of Trusted Software

被引:0
|
作者
Wu Jin [1 ]
Liao Yongjian [1 ]
Nie Xuyun [1 ]
Liu Mengjuan [1 ]
机构
[1] Univ Elect Sci & Technol China, Sch Comp Sci & Engn, Chengdu 610054, Peoples R China
关键词
trust management; trusted Software; RT;
D O I
10.1109/IFITA.2009.386
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The interconnection of software engineering and security engineering has been bringing research challenges and opportunities to its. We propose a layered framework for the trust management model of trusted software, including three layers: the application behavior layer, the trust check engineer layer, and the trust policy layer. The multi-layer approach attempts to organize a complex security design into simpler layers that can be evaluated against security requirements. Each layer has its own form of state information and thus each may be modeled.
引用
收藏
页码:534 / 537
页数:4
相关论文
共 50 条
  • [1] Trusted Software Construction Model Based on Trust Shell
    Tian, Junfeng
    Zhu, Ye
    [J]. NEW TRENDS AND APPLICATIONS OF COMPUTER-AIDED MATERIAL AND ENGINEERING, 2011, 186 : 251 - 255
  • [2] Trust Shell Based Constitution Model of Trusted Software
    Tian Junfeng
    Zhu Ye
    [J]. CHINA COMMUNICATIONS, 2011, 8 (04) : 11 - 22
  • [3] Distributed dynamic trust management model based on trusted domains
    Liu, Wenfen
    Dai, Zhiyong
    Gao, Yan
    [J]. Sichuan Daxue Xuebao (Gongcheng Kexue Ban)/Journal of Sichuan University (Engineering Science Edition), 2014, 46 (04): : 61 - 66
  • [4] Research of Mobile Agent Trust Management Model in Trusted Computing Environment
    Chen, Aili
    Wu, Xiaoping
    [J]. 2010 6TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS NETWORKING AND MOBILE COMPUTING (WICOM), 2010,
  • [5] A Secure Trust Model Based on Trusted Computing
    Yin Zhixi
    [J]. 2009 INTERNATIONAL CONFERENCE ON E-BUSINESS AND INFORMATION SYSTEM SECURITY, VOLS 1 AND 2, 2009, : 170 - 176
  • [6] A Trust Model for Heterogeneous Trusted Computing Architectures
    Zhu, Lu
    Yu, Sheng
    Zhang, Xing
    [J]. NSWCTC 2009: INTERNATIONAL CONFERENCE ON NETWORKS SECURITY, WIRELESS COMMUNICATIONS AND TRUSTED COMPUTING, VOL 2, PROCEEDINGS, 2009, : 539 - +
  • [7] Provision of trusted identity management using trust credentials
    Pearson, Siani
    Mont, Marco Casassa
    [J]. TRUST MANAGEMENT, PROCEEDINGS, 2006, 3986 : 267 - 282
  • [8] A Critical Comparison of Trusted Computing and Trust Management Technologies
    Tomaiuolo, Michele
    [J]. INTERNATIONAL JOURNAL OF CYBER WARFARE AND TERRORISM, 2014, 4 (04) : 64 - 81
  • [9] Trust Management for Trusted Computing Platforms in Web Services
    Nagarajan, Aarthi
    Varadharajan, Vijay
    Hitchens, Michael
    [J]. STC'07: PROCEEDINGS OF THE 2007 ACM WORKSHOP ON SCALABLE TRUSTED COMPUTING, 2007, : 58 - 62
  • [10] Trusted Network Evaluation Model Based on Comprehensive Trust
    YIN Ansheng
    HUANG Haiping
    [J]. Chinese Journal of Electronics, 2021, 30 (06) : 1178 - 1188