Indexed by:
Abstract:
A formal method is used to analyze the integrity of trust chain in trusted computing platform. Based on Biba's security model, components of the platform are tagged with different security level when system boots. With the satisfaction of 'read-up, write-down', information flow analysis mechanism is used to describe the security threats between different components. An evaluation model is built and realized. © 2012 Springer-Verlag GmbH.
Keyword:
Reprint Author's Address:
Email:
Source :
ISSN: 1876-1100
Year: 2012
Issue: VOL. 2
Volume: 125 LNEE
Page: 497-502
Language: English
Cited Count:
SCOPUS Cited Count: 1
ESI Highly Cited Papers on the List: 0 Unfold All
WanFang Cited Count:
Chinese Cited Count:
30 Days PV: 6
Affiliated Colleges: