Abstract
Trust chain is one of the key technologies in designing secure operating system based on TC technology. Constructions of trust chain and trust models are analyzed. Future works in these directions are discussed.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Shen, C.-x., Zhang, H.-g., Feng, D.-g.: Survey of Information Security. China Science 37(2), 129–150 (2007) (in Chinese)
Trusted Computing Group. TCG Specification Architecture Overview [EB/OL] [2005-03-01], http://www.trustedcomputinggroup.org/
Changxiang, S.: Trust Computing Platform and Secure Operating System. Network Security Technology and Application (4), 8–9 (2005) (in Chinese)
Shieh, A.D.: Nexus: A New Operating System for Trustworthy Computing. In: Proceedings of the SOSP, Brighton, UK. ACM, New York (2005)
Zhong, C., Shen, Q.-w.: Development of Modern Operating System. Communications of CCF 9, 15–22 (2008) (in Chinese)
Arbaughz, W.A., Farber, D.J., MSmith, J.: A Secure and Reliable Bootstrap Architecture. In: IEEE Security and Privacy Conference, USA, pp. 65–71 (1997)
Sailer, R., Zhang, X., Jaeger, T., et al.: Design and Implementation of a TCG -based Integrity Measurement Architecture. In: The 13th Usenix Security Symposium, San Diego (2004)
Tao, H., Changxiang, S.: A Trusted Bootstrap Scenario based Trusted Server. Journal of Wuhan University (Nature Science) 50(S1), 12–14 (2004) (in Chinese)
Xiaoyong, L., Zhen, H., Changxiang, S.: Transitive Trust and Performance Analysis in Windows Environment. Journal of Computer Research and Development 44(11), 1889–1895 (2007) (in Chinese)
Maruyama, H., Nakamura, T., Munetoh, S., et al.: Linux with TCPA Integrity Measurement. IBM, Tech. Rep.: RT0575 (2003)
Nahari, H.: Trusted Embedded Secure Linux. In: Proceedings of the Linux Symposium, Ottawa, Ontario Canada, June 27-30, pp. 79–85 (2007)
Hall, K., Lendacky, T., Raliff, E.: Trusted Computing and Linux, http://domino.research.ibm.com/comm/research_projects.nsf/pages/gsal.TCG.html/FILE/TCFL-TPM_intro.pdf
Strasser, M.: A Software-based TPM Emulator for Linux. Swiss Federal Institute of Technology (2004), http://www.infsec.ethz.ch/people/psevinc/TPMEmulatorReport.pdf
Patel, J., Teacy, W.T.L., Jennings, N.R., Luck, M.: A Probabilistic Trust Model for Handling Inaccurate Reputation Sources. In: Herrmann, P., Issarny, V., Shiu, S.C.K. (eds.) iTrust 2005. LNCS, vol. 3477, pp. 193–209. Springer, Heidelberg (2005)
Wen, T., Zhong, C.: Research of Subjective Trust Management Model based on the Fuzzy Set Theory. Journal of Software 14(8), 1401–1408 (2003) (in Chinese)
Audun, J.: An Algebra for Assessing Trust in Certification Chains. In: The Proceedings of NDSS 1999, Network and Distributed System Security Symposium, The Internet Society, San Diego (1999)
Lulai, Y., Guosun, Z., Wei, W.: Trust evaluation model based on DempsterShafer evidence theory. Journal of Wuhan University (Natural Science) 52(5), 627–630 (2006) (in Chinese)
Feng, X., Jian, L., Wei, Z., Chun, C.: Design of a Trust Valuation Model in Software Service Coordination. Journal of Software 14(6), 1043–1051 (2003) (in Chinese)
Jia, Z., Changxiang, S., Jiqiang, L., Zhen, H.: A Noninterference Based Trusted Chain Model. Journal of Computer Research and Development 45(6), 974–980 (2008) (in Chinese)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2009 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Li, H., Tian, X. (2009). Research of Trust Chain of Operating System. In: Deng, H., Wang, L., Wang, F.L., Lei, J. (eds) Artificial Intelligence and Computational Intelligence. AICI 2009. Lecture Notes in Computer Science(), vol 5855. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-05253-8_11
Download citation
DOI: https://doi.org/10.1007/978-3-642-05253-8_11
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-05252-1
Online ISBN: 978-3-642-05253-8
eBook Packages: Computer ScienceComputer Science (R0)