Survey on chain of trust of trusted system

被引:0
|
作者
Xu, Ming-Di [1 ]
Zhang, Huan-Guo [2 ]
Zhang, Fan [3 ]
Yang, Lian-Jia [1 ]
机构
[1] Xu, Ming-Di
[2] Zhang, Huan-Guo
[3] Zhang, Fan
[4] Yang, Lian-Jia
来源
Zhang, Fan | 2024年 / Chinese Institute of Electronics卷 / 42期
关键词
Application systems - Chain of trust - Noninterference theory - Security theory - Static CoT;
D O I
10.3969/j.issn.0372-2112.2014.10.024
中图分类号
学科分类号
摘要
Chain of trust (CoT) is one of the key technologies for constructing trusted system. As viewed from theories and application systems of CoT, this paper introduced several representative models and the latest investigations including noninterference-based CoT theory and composition security-based CoT theory firstly. Afterward, this paper expatiated advantage and shortage of two CoT theories in detail. Secondly, this paper introduced the development of application systems comprising static CoT and dynamic CoT, and analyzed the remote attestation technology of chain of trust, and presented the CoT systems in cloud computing environment, and analyzed the security deficiency of those systems, and then discussed the conformance testing and security evaluation for CoT application system. Finally, this paper put forward the research and development trend for CoT. ©, 2014, Tien Tzu Hsueh Pao/Acta Electronica Sinica. All right reserved.
引用
收藏
页码:2024 / 2031
相关论文
共 50 条
  • [31] Construction of Trusted Routing Based on Trust Computation
    Gong, Bei
    Zhu, Jingxuan
    Wang, Yubo
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2021, 2021 (2021):
  • [32] The Cyprus trust regime-a trusted friend
    Vassiliades, Christodoulos G.
    Kyprianou, Jeannine
    TRUSTS & TRUSTEES, 2014, 20 (05) : 491 - 495
  • [33] Farmers are the most trusted part of the Australian food chain: results from a national survey of consumers
    Henderson, Julie
    Coveney, John
    Ward, Paul R.
    Taylor, Anne W.
    AUSTRALIAN AND NEW ZEALAND JOURNAL OF PUBLIC HEALTH, 2011, 35 (04) : 319 - 324
  • [34] The Design of the Trusted Traceability System of Offshore Oil's Transportation Supply Chain
    Li, Yanjie
    JOURNAL OF COASTAL RESEARCH, 2020, : 454 - 456
  • [35] Integrating Trusted Computing Mechanisms with Trust Models to Achieve Zero Trust Principles
    Alawneh, Muntaha
    Abbadi, Imad M.
    2022 9TH INTERNATIONAL CONFERENCE ON INTERNET OF THINGS: SYSTEMS, MANAGEMENT AND SECURITY, IOTSMS, 2022, : 82 - 87
  • [36] Where Trust Flourishes: Perceptions of Clinicians Who Trust Their Organizations and Are Trusted by Their Patients
    Linzer, Mark
    Neprash, Hannah
    Brown, Roger
    Williams, Eric
    Audi, Crystal
    Poplau, Sara
    Prasad, Kriti
    Khullar, Dhruv
    ANNALS OF FAMILY MEDICINE, 2021, 19 (06) : 521 - 526
  • [37] A strategy for trust propagation along the more trusted paths
    Kianinejad, Marzieh
    Kabiri, Peyman
    2018 3RD CONFERENCE ON SWARM INTELLIGENCE AND EVOLUTIONARY COMPUTATION (CSIEC2018), VOL 3, 2018, : 52 - 57
  • [38] Trusted Software Construction Model Based on Trust Shell
    Tian, Junfeng
    Zhu, Ye
    NEW TRENDS AND APPLICATIONS OF COMPUTER-AIDED MATERIAL AND ENGINEERING, 2011, 186 : 251 - 255
  • [39] Trust model evaluation algorithm based on trusted modeling
    Wang, Jingpei
    Sun, Bin
    Niu, Xinxin
    Yang, Yixian
    Qinghua Daxue Xuebao/Journal of Tsinghua University, 2013, 53 (12): : 1699 - 1707
  • [40] Enforcing trust in pervasive computing with trusted computing technology
    Li, Shiqun
    Balfe, Shane
    Zhou, Jianying
    Chen, Kefei
    CRITICAL INFORMATION INFRASTRUCTURES SECURITY, 2006, 4347 : 195 - +