DocumentCode
517704
Title
Research of Trust Chain Improvement Technology
Author
Yi, Jiang ; Weike, Lv ; Xiangbin, Liu
Author_Institution
Dept. of Comput. Sci., Xiamen Univ., Xiamen, China
Volume
1
fYear
2010
fDate
24-25 April 2010
Firstpage
294
Lastpage
297
Abstract
Trust chain is one of the key technologies in trusted computing. According to analyzing and researching the concept and structure of trusted computing, this paper proposes an improved method to measure trust chain. Trust measurement is computed directly by CRTM, and then draw a conclusion that the novel method is much better than that before improvement by comparing the integrity and authenticity using a computing formula.
Keywords
security of data; CRTM; information authenticity; information integrity; trust chain improvement; trusted computing; Application software; Computer architecture; Computer networks; Computer science; Computer security; Hardware; Operating systems; Secure storage; Time measurement; Wireless communication; TPM; Trust Chain; Trust Measurement; Trusted Computing;
fLanguage
English
Publisher
ieee
Conference_Titel
Networks Security Wireless Communications and Trusted Computing (NSWCTC), 2010 Second International Conference on
Conference_Location
Wuhan, Hubei
Print_ISBN
978-0-7695-4011-5
Electronic_ISBN
978-1-4244-6598-9
Type
conf
DOI
10.1109/NSWCTC.2010.74
Filename
5480693
Link To Document