Visible to the public A trusted measurement scheme suitable for the clients in the trusted network

TitleA trusted measurement scheme suitable for the clients in the trusted network
Publication TypeJournal Article
Year of Publication2014
AuthorsGong Bei, Zhang Jianbiao, Ye Xiaolie, Shen Changxiang
JournalCommunications, China
Volume11
Pagination143-153
Date PublishedApril
ISSN1673-5447
Keywordsaccess control technology, Area measurement, authentication, authentication mechanism, authorisation, Complexity theory, data privacy, dynamic measurement, fine granularity, fine-grained security policy, fine-grained states, Gold, identity privacy, message authentication, network security threat, polynomials, real-time measurement, real-time measurement support, real-time state measurement, Real-time Systems, state measurement, static measurement, trust measurement scheme, Trusted Computing, trusted computing field, trusted measurement scheme, trusted network, trusted network connection
Abstract

The trusted network connection is a hot spot in trusted computing field and the trust measurement and access control technology are used to deal with network security threats in trusted network. But the trusted network connection lacks fine-grained states and real-time measurement support for the client and the authentication mechanism is difficult to apply in the trusted network connection, it is easy to cause the loss of identity privacy. In order to solve the above-described problems, this paper presents a trust measurement scheme suitable for clients in the trusted network, the scheme integrates the following attributes such as authentication mechanism, state measurement, and real-time state measurement and so on, and based on the authentication mechanism and the initial state measurement, the scheme uses the real-time state measurement as the core method to complete the trust measurement for the client. This scheme presented in this paper supports both static and dynamic measurements. Overall, the characteristics of this scheme such as fine granularity, dynamic, real-time state measurement make it possible to make more fine-grained security policy and therefore it overcomes inadequacies existing in the current trusted network connection.

DOI10.1109/CC.2014.6827576
Citation Key6827576