Abstract
In this paper, a formal approach based on predicate logic is proposed for representing and reasoning of trusted computing models. Predicates are defined to represent the characteristics of the objects and the relationship among these objects in a trusted system according to trusted computing specifications. Inference rules of trusted relation are given too. With the semantics proposed, some trusted computing models are formalized and verified, which shows that Predicate calculus logic provides a general and effective method for modeling and reasoning trusted computing systems.
Similar content being viewed by others
References
Trusted Computing Group. TCPA Main Specification Version 1. 1b [EB/OL]. [2006-01-10].https: //www.trustedcomputinggroup.org/specs/TPM/TCPA_Main_TCG_Architecture_vl_1b.pdf.
Trusted Computing Group. Trusted Computing Group [EB/OL]. [2006-01-10].http://www.trustedcomputinggroup.org/downloads/background_docs/TCG_Backgrounder_November_2004.pdf.
Yu Fajiang, Zhang Huanguo. Realization of Trusted Computing Platform [J].Journal of Wuhan University (Natural Science Edition). 2004.50(1): 69–75 (Ch)
Microsoft. Next-Generation Secure Computing Base Home Page [EB/OL]. [2006-01-10].http://www.microsoft. com/resources/ngscb.
Intel. LaGrande Technology Architectural Overview [EB/OL]. [2006-01-10].http://www.intel.com/technology/security/downloads/LT_Arch_Overview.pdf.
Alan Z. Coming soon to VMware, Microsoft, and Xen: AMD Virtualization Technology Solves Virtualization Challenges [EB/OL]. [2006-01-15].http://www.devx.com/amd/Article/30186.
Abadi M, Wobber T. A Logical Account of NGSCB[C]//Formal Techniques for Networked and Distributed Systems (FORTE 2004). Madrid: Springer, 2004:1–12.
Maurer U. Modeling a Public-Key Infrastructure[C]//Proceedings of the 4th European Symposium on Research in Computer Security (ESORICS. 96). Roma: Springer, 1996:325–350.
Bakkali H E L, Kaitouni B I. Predicate Calculus Logic for the PKI Trust Model Analysis [C].IEEE International Symposium on Network Computing and Applications (NCA 2001). Cambridge: IEEE Computer Society, 2001: 368–371.
Howell J, Kotz D. A Formal Semantics for SPKI[C].Proceedings of the Sixth European Symposium on Research in Computer Security (ESORICS 2000) Madrid: Springer, 2000:140–158.
Trusted Computing Group. TPM Work Group [EB/OL]. [2006-01-15].http://www.trustedcomputinggroup.org/groups/tpm/.
Trusted Computing Group. TCG Specification Architecture Overview [EB/OL]. [2006-01-15].http://www.trustedcomputinggroup.org/downloads/TCG_1_0_Architecture_Overview.pdf.
Author information
Authors and Affiliations
Corresponding author
Additional information
Foundation item: Supported by the National High-Technology Research and Development Program (863 Program) of China (2004AA113020)
Biography: CHEN Shuyi (1972-), male, Ph. D. candidate, research direction: network and information security.
Rights and permissions
About this article
Cite this article
Shuyi, C., Yingyou, W. & Hong, Z. Modeling trusted computing. Wuhan Univ. J. Nat. Sci. 11, 1507–1510 (2006). https://doi.org/10.1007/BF02831808
Received:
Issue Date:
DOI: https://doi.org/10.1007/BF02831808
Key words
- trusted computing group (TCG)
- trusted platform module (TPM)
- trusted computing
- root of trust
- predicate logic