Abstract | ||
---|---|---|
Remote attestation is a focus research in Trusted Computing. There are some attestation approaches suggested such as configuration based or property based attestation, but these suggestions have a few fatal deficiencies to overcome, e.g., leakage of platform configuration privacy or hard to define trustworthiness related properties, etc.. To solve these problems, this paper presents a system behavior based attestation model which try to determine the trust state of attesting platform from its system trustworthiness related behaviors. The new attestation model has advantages of privacy protection and high feasibility. In addition, system behavior based attestation can also be used to effectively constrain impacts caused by malicious code such as Trojan and virus which are common in today¿s organization business systems. |
Year | DOI | Venue |
---|---|---|
2006 | 10.1109/IIH-MSP.2006.265080 | IIH-MSP |
Keywords | Field | DocType |
new attestation model,system behavior,trustworthiness related property,attestation approach,attesting platform,organization business system,computing platform,attestation model,remote attestation,efficient attestation,privacy protection,platform configuration privacy,control systems,computer architecture,hardware,grid computing,privacy,information security,trusted computing,information systems | Information system,Business system planning,Grid computing,Trusted Computing,Computer science,Computer security,Information security,Direct Anonymous Attestation,Content-addressable storage,Trojan | Conference |
Volume | Issue | ISSN |
null | null | null |
ISBN | Citations | PageRank |
0-7695-2745-0 | 10 | 0.94 |
References | Authors | |
2 | 3 |
Name | Order | Citations | PageRank |
---|---|---|---|
Xiao-Yong Li | 1 | 37 | 2.44 |
Changxiang Shen | 2 | 127 | 14.57 |
Xiao-Dong Zuo | 3 | 10 | 0.94 |