• DocumentCode
    517704
  • Title

    Research of Trust Chain Improvement Technology

  • Author

    Yi, Jiang ; Weike, Lv ; Xiangbin, Liu

  • Author_Institution
    Dept. of Comput. Sci., Xiamen Univ., Xiamen, China
  • Volume
    1
  • fYear
    2010
  • fDate
    24-25 April 2010
  • Firstpage
    294
  • Lastpage
    297
  • Abstract
    Trust chain is one of the key technologies in trusted computing. According to analyzing and researching the concept and structure of trusted computing, this paper proposes an improved method to measure trust chain. Trust measurement is computed directly by CRTM, and then draw a conclusion that the novel method is much better than that before improvement by comparing the integrity and authenticity using a computing formula.
  • Keywords
    security of data; CRTM; information authenticity; information integrity; trust chain improvement; trusted computing; Application software; Computer architecture; Computer networks; Computer science; Computer security; Hardware; Operating systems; Secure storage; Time measurement; Wireless communication; TPM; Trust Chain; Trust Measurement; Trusted Computing;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Networks Security Wireless Communications and Trusted Computing (NSWCTC), 2010 Second International Conference on
  • Conference_Location
    Wuhan, Hubei
  • Print_ISBN
    978-0-7695-4011-5
  • Electronic_ISBN
    978-1-4244-6598-9
  • Type

    conf

  • DOI
    10.1109/NSWCTC.2010.74
  • Filename
    5480693