Journal of South China University of Technology (Natural Science Edition) ›› 2009, Vol. 37 ›› Issue (5): 106-110.
• Computer Science & Technology • Previous Articles Next Articles
Chen Shu-yi Wen Ying-you Zhao Hong
Received:
Revised:
Online:
Published:
Contact:
About author:
Supported by:
国家自然科学基金资助项目(60602061);国家“863”计划项目(2006AA012413)
Abstract:
A formalized analysis method of trusted computing is proposed based on conditional predicate logic which fomally verifies trusted computing models. In this method, different predicates and reasoning rules are defined, and the factors to influence the credibility are added in the predicate logic as constraint conditions. Thus, the trusted computing models are successfully verified. Moreover, the secure bootstrap process of the trusted computing plat- form is analyzed via an example, and a secure bootstrap process of the trusted computing platform with constrained delegation length is proposed. The results show that the proposed method can be clearly and effectively used for the formalized analysis of trusted computing models.
Key words: information security, trusted computing, trust chain, conditional predicate logic
Chen Shu-yi Wen Ying-you Zhao Hong. Formalized Analysis of Trusted Computing Based on Conditional Predicate Logic[J]. Journal of South China University of Technology (Natural Science Edition), 2009, 37(5): 106-110.
0 / / Recommend
Add to citation manager EndNote|Reference Manager|ProCite|BibTeX|RefWorks
URL: https://zrb.bjb.scut.edu.cn/EN/
https://zrb.bjb.scut.edu.cn/EN/Y2009/V37/I5/106