DocumentCode :
1775124
Title :
Mobile trusted hierarchical model and its applications
Author :
Li Tao ; Hu Aiqun
Author_Institution :
School of Information Science and Engineering, Southeast University, Nanjing, Jiangsu Province, China
fYear :
2014
fDate :
22-24 May 2014
Firstpage :
1
Lastpage :
8
Abstract :
Trusted Computing contains a set of mechanisms to construct trusted environment in mobile terminal. But these mechanisms and trusted environment still stop in the stage of technical description which lacks the supporting of strictly formal proof and model´s description. The existing research about trusted model diverges from reality and is short of flexibility and implementation. This paper proposes a mobile trusted hierarchical model based on security architecture and trusted environment. This model fully considers user´s flexibility and is formally described with Z-notation. The actual suppose conditions are given to guide model´s application. The testing result of prototype system shows that our model can be efficiently used for constructing mobile terminal´s trusted environment.
Keywords :
Trusted Computing; mobile security; trust chain; trusted model;
fLanguage :
English
Publisher :
iet
Conference_Titel :
Communications Security Conference (CSC 2014), 2014
Conference_Location :
Beijing
Type :
conf
DOI :
10.1049/cp.2014.0732
Filename :
6992225
Link To Document :
بازگشت