• Complex
  • Title
  • Keyword
  • Abstract
  • Scholars
  • Journal
  • ISSN
  • Conference
搜索

Author:

Chen, Yasha (Chen, Yasha.) | Sun, Yu (Sun, Yu.)

Indexed by:

EI Scopus

Abstract:

A formal method is used to analyze the integrity of trust chain in trusted computing platform. Based on Biba's security model, components of the platform are tagged with different security level when system boots. With the satisfaction of 'read-up, write-down', information flow analysis mechanism is used to describe the security threats between different components. An evaluation model is built and realized. © 2012 Springer-Verlag GmbH.

Keyword:

Formal methods Trusted computing

Author Community:

  • [ 1 ] [Chen, Yasha]Department of Electrical and Information Engineering, Naval University of Engineering, Wuhan, China
  • [ 2 ] [Sun, Yu]School of Computer, Beijing University of Technology, Beijing, China

Reprint Author's Address:

Email:

Show more details

Related Keywords:

Source :

ISSN: 1876-1100

Year: 2012

Issue: VOL. 2

Volume: 125 LNEE

Page: 497-502

Language: English

Cited Count:

WoS CC Cited Count:

SCOPUS Cited Count: 1

ESI Highly Cited Papers on the List: 0 Unfold All

WanFang Cited Count:

Chinese Cited Count:

30 Days PV: 6

Online/Total:754/10624357
Address:BJUT Library(100 Pingleyuan,Chaoyang District,Beijing 100124, China Post Code:100124) Contact Us:010-67392185
Copyright:BJUT Library Technical Support:Beijing Aegean Software Co., Ltd.