• Complex
  • Title
  • Keyword
  • Abstract
  • Scholars
  • Journal
  • ISSN
  • Conference
搜索

Author:

Wang, Dan (Wang, Dan.) | Wu, Yi (Wu, Yi.)

Indexed by:

EI Scopus

Abstract:

TPCM is an essential part for a trusted computer. How to test and evaluate whether the trusted function can execute in a trusted computer is very significant. A risk assessment model for TPCM based on threat analysis is proposed, which considers comprehensively the essential factors of the information security risk assessment, including the asset, threat and vulnerability of TPCM. The risk computation model is built through analyzing the threat identify, threat consequence attribute and threat index. The risk can be given through the computation of possibility of the threat and their consequence attributes with different weights. By applying the security risk assessment into TPCM, the effectiveness and measurability of the risk assessment process can be improved, which also provides a new approach for the test of the TPCM. © 2011 IEEE.

Keyword:

Risk assessment Trusted computing

Author Community:

  • [ 1 ] [Wang, Dan]College of Computer Science, Beijing University of Technology, Beijing, China
  • [ 2 ] [Wu, Yi]College of Computer Science, Beijing University of Technology, Beijing, China

Reprint Author's Address:

Email:

Show more details

Related Keywords:

Source :

Year: 2011

Page: 3540-3543

Language: Chinese

Cited Count:

WoS CC Cited Count: 0

SCOPUS Cited Count:

ESI Highly Cited Papers on the List: 0 Unfold All

WanFang Cited Count:

Chinese Cited Count:

30 Days PV: 2

Online/Total:325/10550697
Address:BJUT Library(100 Pingleyuan,Chaoyang District,Beijing 100124, China Post Code:100124) Contact Us:010-67392185
Copyright:BJUT Library Technical Support:Beijing Aegean Software Co., Ltd.