Skip to main content

Research on Application’s Credibility Test Method and Calculation Method Based on Application Behavior Declaration

  • Conference paper
  • First Online:
Frontier Computing (FC 2018)

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 542))

Included in the following conference series:

Abstract

The core of this article is based on application behavior declaration, using the “words match deeds” as the standard of judgment, comparing “words” with “lines”, and then using the implicit indicator model to calculate the credibility of the behavior. This paper presents the concept of action path of application behavior, the definition of three types of program event, the recessive parameter model and the concept of credibility-degree calculation. It provides a new idea for the research of credible Verification method.

Foundation item

This dissertation is a part of the important and special project ‘Research and Information System Construction of Evaluation System of Air Pollution Prevention Certification’ (Item No.: 2017YFF0211801) sponsored by Ministry of national science and technique.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Trusted Computing Group. TCG Architecture Overview Specification revision [EB/OL]. [2009-03-08]. http://www.trustedcomputinggroup.org

  2. Shen, C.X., Zhang, H.G., Wang, H.M.: Research and development of trusted computing. Chin. Sci.: Inf. Sci. 40(2), 139–156 (2010)

    Google Scholar 

  3. Yu, X.J., Jiang, G.: Research on application’s credibility verification based on abd. Wuhan Univ. J. Nat. Sci. 21(1), 063–068 (2016)

    Article  MathSciNet  Google Scholar 

  4. Su, D.: A software behavior dynamic trusted research method and its trusted elements. Netw. Secur. Technol. Appl. 4, 14–17 (2013)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ran Xiao .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Yu, X., Xiao, R. (2019). Research on Application’s Credibility Test Method and Calculation Method Based on Application Behavior Declaration. In: Hung, J., Yen, N., Hui, L. (eds) Frontier Computing. FC 2018. Lecture Notes in Electrical Engineering, vol 542. Springer, Singapore. https://doi.org/10.1007/978-981-13-3648-5_1

Download citation

Publish with us

Policies and ethics