Font Size: a A A

Research Of Trust Evaluation Mechanism Based On Trusted Computing Technology

Posted on:2012-08-26Degree:MasterType:Thesis
Country:ChinaCandidate:H DaiFull Text:PDF
GTID:2218330338463033Subject:Computer software and theory
Abstract/Summary:PDF Full Text Request
Trusted computing is a new technology in Information System Security, which has been a new craze of the international information security, and an encouraging result has been achieved. The main goal of trusted computing is to improve the security of computer systems. Trusted Platform Module (TPM), is one of the key technologies of trusted computing, the trust could be extended to the entire computer system and even to the network by using TPM as the root of trust. However, as the TPM technologies are becoming more sophisticated, whether trusted computing system based on TPM is really trusted or not, and how to find and evaluate them is the work need to be resolved.We start from the current features of trusted computing technology, depth analysis of the credibility of trusted computing systems, and illustrate that the trust management should be integrated into this study, using subjective analysis to solve the issue of credibility of trusted computing systems. First, we use logical tree structure to manage these factors which could affect the credibility of trusted computing system, different types and granularity of impact factors are effective integrated, and showing the different branches and levels in the tree structure by classifying these factors and the refinement.Secondly, we analyse and calculate the trustworthiness of the factors which come from different sources in order to eliminate false and phony factors. Then we propose a method of trust evaluation which is combined with the thought of behavior continuing and some of the potential, easily overlooked factors are taken into account to fulfill the evaluation.The simulation shows the mechanism can effectively rule out the negative impact of policy-based fraud on the assessment results, and improve the reliability and accuracy of assessment results. And this theory could be applied in daily life.
Keywords/Search Tags:Trusted Computing, Trust Evaluation, Trusted Tree
PDF Full Text Request
Related items