By Topic

Model of trust management based on finite state machine

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

2 Author(s)
Caiyi Zhu ; Sch. of Inf. & Commun. Eng., Beijing Univ. of Posts & Telecommun., Beijing, China ; Xiangkun Dai

Operations such as application and services are the basis of daily work on computers, safe and reliable application is an important goal of modern research on information security. In this passage, we build trust transfer model based on existing ideas of trusted computing. We guarantee application's static trust by ensure the integrity of application's dynamic library, we guarantee dynamic trust by building transfer model of the trust chain and by analyzing interactions between different applications, hence, the overall trust of application is ensured. Based on the idea of finite state machine and noninterference theory, we abstract computer system into applications, actions and different output states. We define dynamic trust by using mathematical language, provide prerequisites and properties of dynamic trust, deduce theorem of dynamic trust of application and demonstrate the theorem in our model.

Published in:

Cyber Security, Cyber Warfare and Digital Forensic (CyberSec), 2012 International Conference on

Date of Conference:

26-28 June 2012