• 综合性科技类中文核心期刊
    • 中国科技论文统计源期刊
    • 中国科学引文数据库来源期刊
    • 中国学术期刊文摘数据库(核心版)来源期刊
    • 中国学术期刊综合评价数据库来源期刊
ZHUANG Lu, CAI Mian, SHEN Chang-xiang. Hierarchical Verification of Behavior Trustworthiness[J]. Journal of Beijing University of Technology, 2012, 38(9): 1396-1401.
Citation: ZHUANG Lu, CAI Mian, SHEN Chang-xiang. Hierarchical Verification of Behavior Trustworthiness[J]. Journal of Beijing University of Technology, 2012, 38(9): 1396-1401.

Hierarchical Verification of Behavior Trustworthiness

More Information
  • Received Date: December 01, 2010
  • Available Online: December 02, 2022
  • To slow down reduction in availability caused by measurement granularity refinement, a model and the corresponding method of hierarchical verification of behavior trustworthiness were proposed based on concurrency theory.The sequential verification of platform behaviors in time in behavior-oriented trusted dynamic measurement was translated to the verification based on the hierarchical description of expected behaviors.The corresponding theorem ensured equivalence of translation.Efficiency analysis results show that hierarchical verification improves memory efficiency and verification efficiency, and enhances the feasibility of fine-grained trusted dynamic measurement.
  • [01]
    ].https:∥www.trustedcomputinggroup.org/groups/TCG_1_4_Architecture_Overview.pdf.
    [2]
    PENG G J, PAN X C, FU J M, et al.Static extractingmethod of software indended behavior based on APIfunctions invoking[J].Wuhan University Journal ofNatural Sciences, 2008, 13 (5) :615-620.
    [3]
    PENG G J, PAN X C, ZHANG H G, et al.Dynamictrustiness authentication framework based on software'sbehavior integrity[C]∥Proceedings of the 9thInternational Conference for Young Computer Scientists.Hunan:IEEE Computer Society Press, 2008:2283-2288.
    [4]
    屈延文.软件行为学[M].北京:电子工业出版社, 2004:1-101.
    [5]
    庄琭, 蔡勉, 李晨.基于软件行为的可信动态度量[J].武汉大学学报:理学版, 2010, 56 (2) :133-137.ZHUANG Lu, CAI Mian, LI Chen.Software behavior-based trusted dynamic measurement[J].Journal of WuhanUniversity:Natural Science Edition, 2010, 56 (2) :133-137. (in Chinese)
    [6]
    EMERSON E A, SISTLA A P.Symmetry and modelchecking[C]∥Proceedings of the 5th Workshop onComputer-Aided Verification.Heraklion:Springer Verlag, 1993:463-478.
    [7]
    CLARKE E M, EMERSON E A, SISTLA A P.Automaticverification of finite state concurrent systemsusing temporal logic specification[J].ACM Transactionson Programming Languages and Systems, 1986, 8 (2) :244-263.
    [8]
    王永祥, 吴尽昭, 蒋建民.进程代数——对称与动作细化[M].北京:科学出版社, 2007:75-77.
    [9]
    TRETMANS J.Conformance testing with labelled transitionsystems:implementation relations testing generation[J].Computer Networks and ISDN Systems, 1996, 29:49-79.
    [10]
    WINSKEL G.An introduction to event structures[M]∥Linear Time, Branching Time and Partial Order in Logicsand Models for Concurrency.Berlin:Springer-Verlag, 1989, 354:364-397.
    [11]
    BELL D, LAPADULA L.Secure computer systems:mathmatical foundations, MTR-2547[R].Bedford, MA:MITRE Corporation, 1973.
  • Related Articles

    [1]HU Yongli, LI Ouxiao, SUN Yanfeng. Sub-structure Representative Hierarchical Pooling Graph Convolutional Network Model Based on Node Sampling[J]. Journal of Beijing University of Technology, 2024, 50(6): 693-701. DOI: 10.11936/bjutxb2022030009
    [2]WANG Xiao, ZHANG Jianbiao, ZENG Zhiqiang. Construction Method of Trusted Virtual Execution Environment Based on Trusted Platform Control Module[J]. Journal of Beijing University of Technology, 2019, 45(6): 554-565. DOI: 10.11936/bjutxb2018060024
    [3]WANG Yong, XU Rongqiang, REN Xingtian, YANG Jianhong. Formal Verification of Establishment of Chain of Trust in Trusted Computing[J]. Journal of Beijing University of Technology, 2016, 42(3): 387-392. DOI: 10.11936/bjutxb2015060066
    [4]ZHAO Yong, LIAO Jian-hua, SHEN Chang-xiang. Industry Control System Security Assurance Method Based on Access Verification[J]. Journal of Beijing University of Technology, 2013, 39(12): 1861-1867.
    [5]CAI Yong-quan, XUE Fei, YANG Yi. Rational Threshold Signature Based on Hierarchical Key[J]. Journal of Beijing University of Technology, 2013, 39(9): 1366-1370.
    [6]WANG Dan, SUN Hao-yang, WANG Jin, FU Li-hua. Trusted Analysis Model for Interactive Behavior of a Software System Based on Slicing Technology[J]. Journal of Beijing University of Technology, 2013, 39(5): 713-721.
    [7]CAI Hua-li, LIU Lu, WANG Li. Automated Multiple Hierarchical Classification of Web News of Unexpected Events[J]. Journal of Beijing University of Technology, 2011, 37(6): 947-954.
    [8]SUN Guo-zi, GENG Wei-ming, CHEN Dan-wei, LIN Qing-xiu. One Trusted Fix Method of Digital Data Forensics[J]. Journal of Beijing University of Technology, 2010, 36(5): 621-626.
    [9]SHEN Qing-ni, DU Hong, QING Si-han. Hierarchal Security Architecture of Virtualized Trusted Platform[J]. Journal of Beijing University of Technology, 2010, 36(5): 605-610.
    [10]ZHANG Li-qiang, ZHANG Huan-guo, ZHANG Fan. The Trust Measurement Scheme in Trusted Computing[J]. Journal of Beijing University of Technology, 2010, 36(5): 586-591.

Catalog

    Article views (16) PDF downloads (4) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return