A trusted measurement scheme suitable for the clients in the trusted network
Title | A trusted measurement scheme suitable for the clients in the trusted network |
Publication Type | Journal Article |
Year of Publication | 2014 |
Authors | Gong Bei, Zhang Jianbiao, Ye Xiaolie, Shen Changxiang |
Journal | Communications, China |
Volume | 11 |
Pagination | 143-153 |
Date Published | April |
ISSN | 1673-5447 |
Keywords | access control technology, Area measurement, authentication, authentication mechanism, authorisation, Complexity theory, data privacy, dynamic measurement, fine granularity, fine-grained security policy, fine-grained states, Gold, identity privacy, message authentication, network security threat, polynomials, real-time measurement, real-time measurement support, real-time state measurement, Real-time Systems, state measurement, static measurement, trust measurement scheme, Trusted Computing, trusted computing field, trusted measurement scheme, trusted network, trusted network connection |
Abstract | The trusted network connection is a hot spot in trusted computing field and the trust measurement and access control technology are used to deal with network security threats in trusted network. But the trusted network connection lacks fine-grained states and real-time measurement support for the client and the authentication mechanism is difficult to apply in the trusted network connection, it is easy to cause the loss of identity privacy. In order to solve the above-described problems, this paper presents a trust measurement scheme suitable for clients in the trusted network, the scheme integrates the following attributes such as authentication mechanism, state measurement, and real-time state measurement and so on, and based on the authentication mechanism and the initial state measurement, the scheme uses the real-time state measurement as the core method to complete the trust measurement for the client. This scheme presented in this paper supports both static and dynamic measurements. Overall, the characteristics of this scheme such as fine granularity, dynamic, real-time state measurement make it possible to make more fine-grained security policy and therefore it overcomes inadequacies existing in the current trusted network connection. |
DOI | 10.1109/CC.2014.6827576 |
Citation Key | 6827576 |
- network security threat
- trusted network connection
- trusted network
- trusted measurement scheme
- trusted computing field
- Trusted Computing
- trust measurement scheme
- static measurement
- state measurement
- real-time systems
- real-time state measurement
- real-time measurement support
- real-time measurement
- polynomials
- access control technology
- message authentication
- identity privacy
- Gold
- fine-grained states
- fine-grained security policy
- fine granularity
- dynamic measurement
- data privacy
- Complexity theory
- authorisation
- authentication mechanism
- authentication
- Area measurement