Skip to main content
Log in

Modeling trusted computing

  • Trusted Software
  • Published:
Wuhan University Journal of Natural Sciences

Abstract

In this paper, a formal approach based on predicate logic is proposed for representing and reasoning of trusted computing models. Predicates are defined to represent the characteristics of the objects and the relationship among these objects in a trusted system according to trusted computing specifications. Inference rules of trusted relation are given too. With the semantics proposed, some trusted computing models are formalized and verified, which shows that Predicate calculus logic provides a general and effective method for modeling and reasoning trusted computing systems.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Trusted Computing Group. TCPA Main Specification Version 1. 1b [EB/OL]. [2006-01-10].https: //www.trustedcomputinggroup.org/specs/TPM/TCPA_Main_TCG_Architecture_vl_1b.pdf.

  2. Trusted Computing Group. Trusted Computing Group [EB/OL]. [2006-01-10].http://www.trustedcomputinggroup.org/downloads/background_docs/TCG_Backgrounder_November_2004.pdf.

  3. Yu Fajiang, Zhang Huanguo. Realization of Trusted Computing Platform [J].Journal of Wuhan University (Natural Science Edition). 2004.50(1): 69–75 (Ch)

    Google Scholar 

  4. Microsoft. Next-Generation Secure Computing Base Home Page [EB/OL]. [2006-01-10].http://www.microsoft. com/resources/ngscb.

  5. Intel. LaGrande Technology Architectural Overview [EB/OL]. [2006-01-10].http://www.intel.com/technology/security/downloads/LT_Arch_Overview.pdf.

  6. Alan Z. Coming soon to VMware, Microsoft, and Xen: AMD Virtualization Technology Solves Virtualization Challenges [EB/OL]. [2006-01-15].http://www.devx.com/amd/Article/30186.

  7. Abadi M, Wobber T. A Logical Account of NGSCB[C]//Formal Techniques for Networked and Distributed Systems (FORTE 2004). Madrid: Springer, 2004:1–12.

    Google Scholar 

  8. Maurer U. Modeling a Public-Key Infrastructure[C]//Proceedings of the 4th European Symposium on Research in Computer Security (ESORICS. 96). Roma: Springer, 1996:325–350.

    Google Scholar 

  9. Bakkali H E L, Kaitouni B I. Predicate Calculus Logic for the PKI Trust Model Analysis [C].IEEE International Symposium on Network Computing and Applications (NCA 2001). Cambridge: IEEE Computer Society, 2001: 368–371.

    Google Scholar 

  10. Howell J, Kotz D. A Formal Semantics for SPKI[C].Proceedings of the Sixth European Symposium on Research in Computer Security (ESORICS 2000) Madrid: Springer, 2000:140–158.

    Google Scholar 

  11. Trusted Computing Group. TPM Work Group [EB/OL]. [2006-01-15].http://www.trustedcomputinggroup.org/groups/tpm/.

  12. Trusted Computing Group. TCG Specification Architecture Overview [EB/OL]. [2006-01-15].http://www.trustedcomputinggroup.org/downloads/TCG_1_0_Architecture_Overview.pdf.

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Zhao Hong.

Additional information

Foundation item: Supported by the National High-Technology Research and Development Program (863 Program) of China (2004AA113020)

Biography: CHEN Shuyi (1972-), male, Ph. D. candidate, research direction: network and information security.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Shuyi, C., Yingyou, W. & Hong, Z. Modeling trusted computing. Wuhan Univ. J. Nat. Sci. 11, 1507–1510 (2006). https://doi.org/10.1007/BF02831808

Download citation

  • Received:

  • Issue Date:

  • DOI: https://doi.org/10.1007/BF02831808

Key words

CLC number

Navigation