Indexed by:
Abstract:
Chinese specification for trusted computing [7] has adopted a different cryptography scheme from specifications released by trusted computing group (TCG) [1]. Although the two sets of specifications are functional compatible, it is hard for different platforms which conform to different specifications to trust each other. This paper proposes a trust model which includes meanings of both behavior trust and identity trust to establish a trust relationship for heterogeneous trusted computing architectures.
Keyword:
Reprint Author's Address:
Email:
Source :
NSWCTC 2009: INTERNATIONAL CONFERENCE ON NETWORKS SECURITY, WIRELESS COMMUNICATIONS AND TRUSTED COMPUTING, VOL 2, PROCEEDINGS
Year: 2009
Page: 539-,
Language: English
Cited Count:
WoS CC Cited Count: 0
SCOPUS Cited Count: 2
ESI Highly Cited Papers on the List: 0 Unfold All
WanFang Cited Count:
Chinese Cited Count:
30 Days PV: 6
Affiliated Colleges: