Font Size: a A A

Research About Some Problems On Trusted Internetware Measurement In The Environment Of Internet

Posted on:2011-11-07Degree:MasterType:Thesis
Country:ChinaCandidate:C N WangFull Text:PDF
GTID:2178360308970763Subject:Computer software and theory
Abstract/Summary:PDF Full Text Request
With the rapid development and popularization of Internet, more and more people pay attention to the field of information security. Trusted computing is the hottest topic in the field of information security, which affects software or systems work and interacts naturally or not. Experts at home and abroad have researched trusted computing deeply, but they have emphasized particularly on hardware, not software. There isn't a recognized theory and model about trusted measurement.There are a lot of factitious factors intervened when software was designed and developed, so how to evaluate the actual effect, failure and bug of software inside with the form of measure has become a mainstream. This paper has researched and discussed on the problems of trusted measurement elementarily.First, this paper proposed the conception of trusted tree based on decision-making-tree. Least trusted genes can be got through decomposing trusted tree, and we use the least trusted genes to build least trusted tree.Second, there are three kinds of attributes of software according to the trusted degree, and they are key trusted attributes, attributes assessed with standards and ones evaluated by experts respectively. Thereinto, the second one belongs to impersonal evaluation and the first and last one belongs to subjective evaluation, which may need experts' experience to make sure the weight of each attribute. Weight is distributed according to effect degree, and we can get a scientific value with measurement.Next, this paper proposed a trusted measurement evaluation model about software based on security model and credit model. It can be judged whether software are trusted or not with trusted space. But the assured trusted value is obtained much more complicatedly. We select some experts to grade the each attribute of software, and then compute weight proportion of each attribute using matrix arithmetic.Last, we use a testing example to validate the method of trusted measurement proposed in the paper feasible or not. Creditability evaluation system use subjective grading method with measurement to obtain emulational experiment data. Then, we analyse and compare the result of experiment to elicit conclusions.
Keywords/Search Tags:least trusted gene, least trusted tree, trusted measurement evaluation model, trusted computing
PDF Full Text Request
Related items