Font Size: a A A

The Basic Research And Application Of Trusted Software Designing Based On Trusted User Behavior

Posted on:2015-07-21Degree:MasterType:Thesis
Country:ChinaCandidate:T B MengFull Text:PDF
GTID:2298330452453242Subject:Software engineering
Abstract/Summary:PDF Full Text Request
The current research of trusted software is mainly about to ensure software itself trusted,which make the software itself still provide reliable service when being attacked. Softwareoperator is user, and attacker and damager is user, so the research of user behavior is veryimport. The main research content of this article is around user behavior trusted and softwaretrusted. In this paper, the trust used to full life cycle of software, and add factors and methodsto ensure the trust of software. And we make further study to guarantee the trust of userbehaviors, and for the first time the trust of user behavior combined with the trust of software,we raise “the basic research and application of trusted software designing based on trusteduser behavior”, and make software more trusted efficiently.The main research content of this article is:1) The factors about constructing trusted software. First, this paper introduces thefactors of trusted user behavior, and specifies the scope of these factors. Secondly, this paperintroduces the factors of trusted software, and has carried on the detailed to these factors.Finally, this paper makes a careful analysis about common software vulnerabilities.2) Demand analysis based on trusted user behavior. Mainly introduces the demandanalysis of trusted software. This paper first puts forward the demand of the trusted userbehavior and the demand of the trusted software, and makes a detailed statement for thedemand of the trusted user behavior. Then, this paper introduces the four methods forobtaining trusted the software’s demand.3) Software design based on trusted user behavior. First, this paper makes the design ofthe trusted user behavior, including user identity design, the design of the user behaviorstatement, the design of evaluation model of the trusted user behavior, the design ofmonitoring the user behavior. Then, this paper makes the design of trusted software, includingavoiding wrong, finding wrong, error correction, fault-tolerant in design phase, as well asother aspects about trusted software design.4) Software coding implementation and operation maintenance based on trusted userbehavior. First, coding for trusted user behavior, including coding implementation of thetrusted authentication module of the user identity, coding implementation of user behaviorstatement, coding implementation of trusted evaluation module of user behavior, codingimplementation of monitoring module of user behavior. Then, coding for trusted software,including coding implementation of fault-tolerance module, and coding implementation of otheraspects of the trusted software. Finally, this paper introduces the maintenance of trustedsoftware in detail, including the maintenance of the trusted user behavior and the maintenance of trusted software.
Keywords/Search Tags:user behavior trusted, software trusted, trusted software design, trusted software
PDF Full Text Request
Related items