LI Jian, HE Yongzhong, XU Kaiyong. Software Download Framework Based on Trust Measurement[J]. Geomatics and Information Science of Wuhan University, 2008, 33(10): 1062-1066.
Citation: LI Jian, HE Yongzhong, XU Kaiyong. Software Download Framework Based on Trust Measurement[J]. Geomatics and Information Science of Wuhan University, 2008, 33(10): 1062-1066.

Software Download Framework Based on Trust Measurement

Funds: 国家863计划资助项目(2006AA01Z4402007AA01Z40)
More Information
  • Received Date: August 27, 2008
  • Revised Date: August 27, 2008
  • Published Date: October 04, 2008
  • According to the fact that there are some secure faults in software download schemes due to the lack of trust measurement in software download for mobile equipments,making use of trust mechanism of identity management and secure characteristics such as integrity verification,protect storage,domain isolation,access control and remote platform verifying trusted computing possess,software download service model based on trust measurement of trusted identity management architecture has been put forward,software download service process has been designed,software download service protocol has been studied,the security performance of the protocol has been analyzed,the security performance comparison between several software download schemes has been made,the result shows that the scheme improve security performance of software download effectively.
  • Related Articles

    [1]HUANG Ningyu, ZHANG Xing. Analysis and Improvement of Delegation Mechanism in a Trusted Computing Platform[J]. Geomatics and Information Science of Wuhan University, 2010, 35(5): 599-602.
    [2]LIU Lizhao, WEI Peng, WANG Ying, LI Maoqing. Quantitative Assignment of the Grid Behavior Trust Model Based on Trusted Computing[J]. Geomatics and Information Science of Wuhan University, 2010, 35(5): 587-590.
    [3]FU Xiaojing, ZHANG Guoyin, MA Chunguang. An Identity-based Authenticated Key Agreement Sheme for Heterogeneous Sensor Networks[J]. Geomatics and Information Science of Wuhan University, 2010, 35(5): 582-586.
    [4]MA Chunguang, CHU Zhenjiang, WANG Jiuru, WANG Huiqiang. A Framework for Key Management in Heterogeneous Sensor Networks[J]. Geomatics and Information Science of Wuhan University, 2010, 35(5): 509-511.
    [5]SHI Wenchang. Design of Trust Base in Operating Systems[J]. Geomatics and Information Science of Wuhan University, 2010, 35(5): 505-508.
    [6]CHEN Wenzhi, HUANG Wei. SmartMK:TPM-based Trusted Multi-Kernel Operating System Architecture[J]. Geomatics and Information Science of Wuhan University, 2008, 33(10): 1034-1037.
    [7]ZHANG Xing, SHEN Changxiang. A Novel Design of Trusted Platform Control Module[J]. Geomatics and Information Science of Wuhan University, 2008, 33(10): 1011-1014.
    [8]ZHANG Huanguo, QIN Zhongping, LIU Yi, HAN Yongqiao. A New Type Trusted Platform Module(TPM)[J]. Geomatics and Information Science of Wuhan University, 2008, 33(10): 991-994.
    [9]ZHANG Jianhua, GUAN Jihong, WANG Leichun, ZHANG Jun. Metadata Classified Management Mechanism Based on Data Grid[J]. Geomatics and Information Science of Wuhan University, 2005, 30(1): 56-60.
    [10]ZHAO Bo, LIU Shubo, TANG Ming, ZHANG Huanguo. Implementation of Trusted Computing in CommercialCryptogram Based on Hardware[J]. Geomatics and Information Science of Wuhan University, 2004, 29(11): 1030-1033.

Catalog

    Article views (951) PDF downloads (133) Cited by()
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return