Survey on chain of trust of trusted system

被引:0
|
作者
Xu, Ming-Di [1 ]
Zhang, Huan-Guo [2 ]
Zhang, Fan [3 ]
Yang, Lian-Jia [1 ]
机构
[1] Xu, Ming-Di
[2] Zhang, Huan-Guo
[3] Zhang, Fan
[4] Yang, Lian-Jia
来源
Zhang, Fan | 2024年 / Chinese Institute of Electronics卷 / 42期
关键词
Application systems - Chain of trust - Noninterference theory - Security theory - Static CoT;
D O I
10.3969/j.issn.0372-2112.2014.10.024
中图分类号
学科分类号
摘要
Chain of trust (CoT) is one of the key technologies for constructing trusted system. As viewed from theories and application systems of CoT, this paper introduced several representative models and the latest investigations including noninterference-based CoT theory and composition security-based CoT theory firstly. Afterward, this paper expatiated advantage and shortage of two CoT theories in detail. Secondly, this paper introduced the development of application systems comprising static CoT and dynamic CoT, and analyzed the remote attestation technology of chain of trust, and presented the CoT systems in cloud computing environment, and analyzed the security deficiency of those systems, and then discussed the conformance testing and security evaluation for CoT application system. Finally, this paper put forward the research and development trend for CoT. ©, 2014, Tien Tzu Hsueh Pao/Acta Electronica Sinica. All right reserved.
引用
收藏
页码:2024 / 2031
相关论文
共 50 条
  • [21] Extending On-Chain Trust to Off-Chain - Trustworthy Blockchain Data Collection Using Trusted Execution Environment (TEE)
    Liu, Chunchi
    Guo, Hechuan
    Xu, Minghui
    Wang, Shengling
    Yu, Dongxiao
    Yu, Jiguo
    Cheng, Xiuzhen
    IEEE TRANSACTIONS ON COMPUTERS, 2022, 71 (12) : 3268 - 3280
  • [22] TrustChain: Trusted Blockchain-Based System for Supply Chain Traceability
    Mohammed, Muhannad
    Alzahrani, Muhannad
    Hejjou, Abdulla
    Alharby, Maher
    ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING, 2025, 50 (02) : 891 - 909
  • [23] Trust and the Goldacre Review: why trusted research environments are not about trust
    Graham, Mackenzie
    Milne, Richard
    Fitzsimmons, Paige
    Sheehan, Mark
    JOURNAL OF MEDICAL ETHICS, 2022, : 670 - 673
  • [24] Trusted Software Supply Chain
    Singi, Kapil
    Bose, R. P. Jagadeesh Chandra
    Podder, Sanjay
    Burden, Adam P.
    34TH IEEE/ACM INTERNATIONAL CONFERENCE ON AUTOMATED SOFTWARE ENGINEERING (ASE 2019), 2019, : 1212 - 1213
  • [25] Towards a trust model in P2P system based on trusted computing
    Hao, Liming
    Lu, Songnian
    Yang, Shutang
    WMSCI 2006: 10TH WORLD MULTI-CONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL II, PROCEEDINGS, 2006, : 98 - 103
  • [26] Trust Metrics Based on a Trusted Network Element
    Hiltunen, Jouni
    Kuusijarvi, Jarkko
    2015 IEEE TRUSTCOM/BIGDATASE/ISPA, VOL 1, 2015, : 660 - 667
  • [27] Trusted research environments are definitely about trust
    Affleck, Paul
    Westaway, Jenny
    Smith, Maurice
    Schrecker, Geoff
    JOURNAL OF MEDICAL ETHICS, 2023, 49 (09) : 656 - 657
  • [28] Science Advice in an Environment of Trust: Trusted, but Not Trustworthy?
    Gundersen, Torbjorn
    Holst, Cathrine
    SOCIAL EPISTEMOLOGY, 2022, 36 (05) : 629 - 640
  • [29] A Secure Trust Model Based on Trusted Computing
    Yin Zhixi
    2009 INTERNATIONAL CONFERENCE ON E-BUSINESS AND INFORMATION SYSTEM SECURITY, VOLS 1 AND 2, 2009, : 170 - 176
  • [30] A Trust Model for Heterogeneous Trusted Computing Architectures
    Zhu, Lu
    Yu, Sheng
    Zhang, Xing
    NSWCTC 2009: INTERNATIONAL CONFERENCE ON NETWORKS SECURITY, WIRELESS COMMUNICATIONS AND TRUSTED COMPUTING, VOL 2, PROCEEDINGS, 2009, : 539 - +