About | Contact Us | Register | Login
ProceedingsSeriesJournalsSearchEAI
International Conference on Security and Privacy in Communication Networks. 10th International ICST Conference, SecureComm 2014, Beijing, China, September 24-26, 2014, Revised Selected Papers, Part II

Research Article

A New Trust Chain Security Evaluation Model and Tool

Download(Requires a free EAI acccount)
352 downloads
Cite
BibTeX Plain Text
  • @INPROCEEDINGS{10.1007/978-3-319-23802-9_30,
        author={Wei Hu and Dongyao Ji and Ting Wang and Gang Yao},
        title={A New Trust Chain Security Evaluation Model and Tool},
        proceedings={International Conference on Security and Privacy in Communication Networks. 10th International ICST Conference, SecureComm 2014, Beijing, China, September 24-26, 2014, Revised Selected Papers, Part II},
        proceedings_a={SECURECOMM},
        year={2015},
        month={12},
        keywords={Trusted computing Trust chain Model checking Probabilistic finite state automaton Probabilistic computation tree logic},
        doi={10.1007/978-3-319-23802-9_30}
    }
    
  • Wei Hu
    Dongyao Ji
    Ting Wang
    Gang Yao
    Year: 2015
    A New Trust Chain Security Evaluation Model and Tool
    SECURECOMM
    Springer
    DOI: 10.1007/978-3-319-23802-9_30
Wei Hu1, Dongyao Ji1,*, Ting Wang1, Gang Yao1
  • 1: Institute of Information Engineering, Chinese Academy of Sciences
*Contact email: jidongyao@is.ac.cn

Abstract

We’ve build a model of trust chain, and developed TCSE, a tool for estimating the security properties of the trust chain. The highlight of TCSE is that it can generate a probabilistic finite state automaton and verify or calculate four security properties of a trust chain following our algorithms. These properties are: credibility, usability, restorability and conformity. With these four values of a trust chain, we can estimate the security of a trusted computer (a computer with a trusted computing module). Using this tool, an ordinary user with the help of the Common Vulnerability Scoring System (CVSS) from which one can easily get the needed parameters can figure out these four properties quickly. This tool can be used in the area where the security of trusted computers are needed to be precisely quantized.

Keywords
Trusted computing Trust chain Model checking Probabilistic finite state automaton Probabilistic computation tree logic
Published
2015-12-03
Appears in
SpringerLink
http://dx.doi.org/10.1007/978-3-319-23802-9_30
Copyright © 2014–2025 ICST
EBSCOProQuestDBLPDOAJPortico
EAI Logo

About EAI

  • Who We Are
  • Leadership
  • Research Areas
  • Partners
  • Media Center

Community

  • Membership
  • Conference
  • Recognition
  • Sponsor Us

Publish with EAI

  • Publishing
  • Journals
  • Proceedings
  • Books
  • EUDL