Title :
Research on Trust Evaluation Model Based on TPM
Author :
Ou, Wei ; Wang, Xiaofeng ; Han, Wenbao ; Wang, Yongjun
Author_Institution :
Sch. of Comput. Sci., Nat. Univ. of Defense Technol., Changsha, China
Abstract :
Trusted computing is an important research field in information security and trust evaluation for trust model is the key issue to be resolved. It is great significance for ensuring security of trust model for trusted computing to analyze normally and verify in design process of application model for trusted computing and analyze its trust in theory. In this paper the problems of security and trust for TPM were studied, a trust evaluation model based on TPM was proposed and credibility of trust model for TPM was analyzed in theory. In this trust evaluation model credibility of trust includes direct trust, recommendation trust and indirect trust. Direct trust is expressed by satisfaction of subject and it mainly comes from success or failure of two subject´s communications. Recommendation trust is a subject trusts or adopts experience information recommended by the other subject. Indirect trust is composed by trust chain made up of a series of recommendations.
Keywords :
security of data; indirect trust; information security; recommendation trust; trust evaluation model; trust model security; trusted computing group; trusted platform module; Authentication; Collaboration; Computer networks; Computer science; Cryptography; Hardware; Information security; Mobile computing; Process design; Secure storage; TPM; trust chain; trust evaluation; trust model; trusted computing;
Conference_Titel :
Frontier of Computer Science and Technology, 2009. FCST '09. Fourth International Conference on
Conference_Location :
Shanghai
Print_ISBN :
978-0-7695-3932-4
Electronic_ISBN :
978-1-4244-5467-9
DOI :
10.1109/FCST.2009.10