首页 | 本学科首页   官方微博 | 高级检索  
     


Modeling trusted computing
Authors:Chen Shuyi  Wen Yingyou  Zhao Hong
Affiliation:(1) School of Information Science and Engineering, Northeastern University, 110004 Shenyang, Liaoning, China
Abstract:In this paper, a formal approach based on predicate logic is proposed for representing and reasoning of trusted computing models. Predicates are defined to represent the characteristics of the objects and the relationship among these objects in a trusted system according to trusted computing specifications. Inference rules of trusted relation are given too. With the semantics proposed, some trusted computing models are formalized and verified, which shows that Predicate calculus logic provides a general and effective method for modeling and reasoning trusted computing systems.
Keywords:trusted computing group (TCG)  trusted platform module (TPM)  trusted computing  root of trust  predicate logic
本文献已被 CNKI 维普 SpringerLink 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号