Survey on chain of trust of trusted system

被引:0
|
作者
Xu, Ming-Di [1 ]
Zhang, Huan-Guo [2 ]
Zhang, Fan [3 ]
Yang, Lian-Jia [1 ]
机构
[1] Xu, Ming-Di
[2] Zhang, Huan-Guo
[3] Zhang, Fan
[4] Yang, Lian-Jia
来源
Zhang, Fan | 2024年 / Chinese Institute of Electronics卷 / 42期
关键词
Application systems - Chain of trust - Noninterference theory - Security theory - Static CoT;
D O I
10.3969/j.issn.0372-2112.2014.10.024
中图分类号
学科分类号
摘要
Chain of trust (CoT) is one of the key technologies for constructing trusted system. As viewed from theories and application systems of CoT, this paper introduced several representative models and the latest investigations including noninterference-based CoT theory and composition security-based CoT theory firstly. Afterward, this paper expatiated advantage and shortage of two CoT theories in detail. Secondly, this paper introduced the development of application systems comprising static CoT and dynamic CoT, and analyzed the remote attestation technology of chain of trust, and presented the CoT systems in cloud computing environment, and analyzed the security deficiency of those systems, and then discussed the conformance testing and security evaluation for CoT application system. Finally, this paper put forward the research and development trend for CoT. ©, 2014, Tien Tzu Hsueh Pao/Acta Electronica Sinica. All right reserved.
引用
收藏
页码:2024 / 2031
相关论文
共 50 条
  • [1] Testing on trust chain of trusted computing platform based on labeled transition system
    Xu, Ming-Di
    Zhang, Huan-Guo
    Yan, Fei
    Jisuanji Xuebao/Chinese Journal of Computers, 2009, 32 (04): : 635 - 645
  • [2] Security analysis on trust chain of trusted computing platform
    Xu M.-D.
    Zhang H.-G.
    Zhao H.
    Li J.-L.
    Yan F.
    Jisuanji Xuebao/Chinese Journal of Computers, 2010, 33 (07): : 1165 - 1176
  • [3] Research on Trust Chain Model Based on Dual Trusted Measurement Mechanism
    Yuan, Depeng
    Lu, Chuan
    Wang, Yu
    2010 INTERNATIONAL CONFERENCE ON INFORMATION, ELECTRONIC AND COMPUTER SCIENCE, VOLS 1-3, 2010, : 1423 - 1425
  • [4] A Multi Trust Chain Scheme in Trusted Cross-Domain Interaction
    Tian, Liye
    Jiang, Wei
    2012 INTERNATIONAL CONFERENCE ON INDUSTRIAL CONTROL AND ELECTRONICS ENGINEERING (ICICEE), 2012, : 550 - 553
  • [5] A formal method based on noninterference for analyzing trust chain of trusted computing platform
    Zhang X.
    Huang Q.
    Shen C.-X.
    Jisuanji Xuebao/Chinese Journal of Computers, 2010, 33 (01): : 74 - 81
  • [6] Profiling with trust: system monitoring from trusted execution environments
    Christian Eichler
    Jonas Röckl
    Benedikt Jung
    Ralph Schlenk
    Tilo Müller
    Timo Hönig
    Design Automation for Embedded Systems, 2024, 28 : 23 - 44
  • [7] Profiling with trust: system monitoring from trusted execution environments
    Eichler, Christian
    Roeckl, Jonas
    Jung, Benedikt
    Schlenk, Ralph
    Mueller, Tilo
    Hoenig, Timo
    DESIGN AUTOMATION FOR EMBEDDED SYSTEMS, 2024, 28 (01) : 23 - 44
  • [8] The Failure of Trust in Trusted Systems
    Mison, Angela
    Davies, Gareth
    Eden, Peter
    PROCEEDINGS OF THE 17TH INTERNATIONAL CONFERENCE ON CYBER WARFARE AND SECURITY (ICCWS 2022), 2022, : 568 - 575
  • [9] Analyzing the trust chain of trusted virtualization platform based on the extended LS2
    Chang, De-Xian
    Feng, Deng-Guo
    Qin, Yu
    Zhang, Qian-Ying
    Tongxin Xuebao/Journal on Communications, 2013, 34 (05): : 31 - 41
  • [10] Design and Implementation of Trusted-Router Based on Trust Management System
    Sun Bin
    Mao Yuankui
    CHINA COMMUNICATIONS, 2011, 8 (05) : 63 - 69