Title :
Research of Trust Chain Improvement Technology
Author :
Yi, Jiang ; Weike, Lv ; Xiangbin, Liu
Author_Institution :
Dept. of Comput. Sci., Xiamen Univ., Xiamen, China
Abstract :
Trust chain is one of the key technologies in trusted computing. According to analyzing and researching the concept and structure of trusted computing, this paper proposes an improved method to measure trust chain. Trust measurement is computed directly by CRTM, and then draw a conclusion that the novel method is much better than that before improvement by comparing the integrity and authenticity using a computing formula.
Keywords :
security of data; CRTM; information authenticity; information integrity; trust chain improvement; trusted computing; Application software; Computer architecture; Computer networks; Computer science; Computer security; Hardware; Operating systems; Secure storage; Time measurement; Wireless communication; TPM; Trust Chain; Trust Measurement; Trusted Computing;
Conference_Titel :
Networks Security Wireless Communications and Trusted Computing (NSWCTC), 2010 Second International Conference on
Conference_Location :
Wuhan, Hubei
Print_ISBN :
978-0-7695-4011-5
Electronic_ISBN :
978-1-4244-6598-9
DOI :
10.1109/NSWCTC.2010.74