By Topic

Risk assessment model for TPCM based on threat analysis

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

2 Author(s)
Dan Wang ; Coll. of Comput. Sci., Beijing Univ. of Technol., Beijing, China ; Yi Wu

TPCM is an essential part for a trusted computer. How to test and evaluate whether the trusted function can execute in a trusted computer is very significant. A risk assessment model for TPCM based on threat analysis is proposed, which considers comprehensively the essential factors of the information security risk assessment, including the asset, threat and vulnerability of TPCM. The risk computation model is built through analyzing the threat identify, threat consequence attribute and threat index. The risk can be given through the computation of possibility of the threat and their consequence attributes with different weights. By applying the security risk assessment into TPCM, the effectiveness and measurability of the risk assessment process can be improved, which also provides a new approach for the test of the TPCM.

Published in:

Computer Science and Service System (CSSS), 2011 International Conference on

Date of Conference:

27-29 June 2011