Modeling trusted computing |
| |
Authors: | Chen Shuyi Wen Yingyou Zhao Hong |
| |
Affiliation: | (1) School of Information Science and Engineering, Northeastern University, 110004 Shenyang, Liaoning, China |
| |
Abstract: | In this paper, a formal approach based on predicate logic is proposed for representing and reasoning of trusted computing models. Predicates are defined to represent the characteristics of the objects and the relationship among these objects in a trusted system according to trusted computing specifications. Inference rules of trusted relation are given too. With the semantics proposed, some trusted computing models are formalized and verified, which shows that Predicate calculus logic provides a general and effective method for modeling and reasoning trusted computing systems. |
| |
Keywords: | trusted computing group (TCG) trusted platform module (TPM) trusted computing root of trust predicate logic |
本文献已被 CNKI 维普 SpringerLink 等数据库收录! |