Indexed by:
Abstract:
Productive information system has high-level security requirements, but Trusted Computing Group's solution of trust chain isn't competent. After analysis and comparison of two different trust transfer ways, a new trust chain scheme was designed and its architecture was shown. With independent TPCM as a trust root, this scheme combined the advantages of linear and radial transfer. So that stronger cryptographic algorithm could be adopted by TPCM and applications' trust attenuation decreased a lot. This scheme was described formally by 6 linear temporal logic rules. It was proved that based on these rules, this scheme could transfer trust from trust root to applications. Meanwhile, it could actively report and handle exceptions in trust chain building and system running. Conclusion and future work were given at the end of this manuscript. © 2012 Universitas Ahmad Dahlan.
Keyword:
Reprint Author's Address:
Email:
Source :
Telkomnika
ISSN: 2302-4046
Year: 2012
Issue: 5
Volume: 10
Page: 1093-1100
Cited Count:
WoS CC Cited Count: 0
SCOPUS Cited Count:
ESI Highly Cited Papers on the List: 0 Unfold All
WanFang Cited Count:
Chinese Cited Count:
30 Days PV: 11
Affiliated Colleges: