Full-Text Search:
Home|Journal Papers|About CNKI|User Service|FAQ|Contact Us|中文
《Application Research of Computers》 2011-05
Add to Favorite Get Latest Update

Dynamic remote attestation model in real-time monitoring

WANG Ning,WU Zhen-qiang,FU Xiang-ping(College of Computer Science,Shaanxi Normal University,Xi'an 710062,China)  
As for the limitation of static information verification in the current remote attestation,this paper introduced a new dynamic remote attestation model in real-time monitoring.It improved the platform's dynamic trustworthiness from behavior and real-time monitoring after its connection to the trusted network,divided all the platform's behaviors into the changes of access control policy and user's applications.Meanwhile DRAM-RTM combined the behavior-based integrity measurement with the action of behavior to check the remote platform.In order to reduce the system load,DRAM-RTM adjusted its real-time monitoring according to the historical record of dynamic remote attestation.It could improve model's performance.Finally,gave the flow of the protocol and analysis.
【Fund】: 国家自然科学基金重点资助项目(60633020)
【CateGory Index】: TP393.08
Download(CAJ format) Download(PDF format)
CAJViewer7.0 supports all the CNKI file formats; AdobeReader only supports the PDF format.
【Citations】
Chinese Journal Full-text Database 3 Hits
1 Liu Zi-wen①② Feng Deng-guo② ①(Department of Electronic Engineering and Information Science,University of Science and Technology of China, Hefei 230027,China) ②(State Key Laboratory of Information Security,Institute of Software,Chinese Academy of Sciences, Beijing 100190,China);TPM-Based Dynamic Integrity Measurement Architecture[J];Journal of Electronics & Information Technology;2010-04
2 Lin Chuang1, Tian Liqin1,2, and Wang Yuanzhuo11(Department of Computer Science and Technology, Tsinghua University, Beijing 100084)2(School of Information Engineering, University of Science and Technology Beijing, Beijing 100083);Research on User Behavior Trust in Trustworthy Network[J];Journal of Computer Research and Development;2008-12
3 XU Guo-yu, CHANG Chao-wen, HUANG Jian, GU Dong-dong (Institute of Electronic Technology, PLA Information Engineering University, Zhengzhou 450004);Platform Integrity Attestation Based on Time[J];Computer Engineering;2009-06
【Co-citations】
Chinese Journal Full-text Database 10 Hits
1 Zhou Yi,Zheng Xuefeng,Yu Yike(Computer College,Beijing University of Science&Technology,Beijing 100083,China);Implementation to Layered Model Based on Evolutionary Theory in Trusted Computing Environment[J];Telecommunications Science;2010-06
2 Zuo Shuangyong (School of Mathematics and Computational Science,Guilin University of Electronic Technology,Guilin 541004,China);Development of the transitive trusted chain research[J];Journal of Guilin University of Electronic Technology;2010-04
3 LIU Guang-bin,MAN Jun-feng,LI Chang-yun,WEN Xiang-bing(Hunan University of Technology,Zhuzhou Hunan 412008,China);Recognizing and predicting of strange interactive entity's behavior in pervasive environment[J];Application Research of Computers;2009-12
4 ZHOU Yi,ZHENG Xue-feng,YU Yi-ke(School of Information Engineering,University of Science & Technology Beijing,Beijing 100083,China);Layered trusted computing platform model and its implementation[J];Application Research of Computers;2010-01
5 Qiu Gang1 Liu Zhidu2 Zhou Lihua1(1 The CNIS Key Laboratory of the Education Ministry,Xidian University,Xi′an 710071,China;2 College of Computer and Information Technology,Nanyang Normal University,Nanyang 473061,Henan China);Remote attestation scheme based on Merkle tree[J];Journal of Huazhong University of Science and Technology(Nature Science Edition);2010-04
6 MA Jian-wei, SHU Zhen, GUO De-ke, CHEN Hong-hui(C4ISR Technology Key Laboratory of Science & Technology for National Defense, National University of Defense Technology, Changsha 410073, China);Survey on service composition approach considering trustworthiness of QoS data[J];Application Research of Computers;2010-05
7 ZHOU Yi ZHENG Xue-feng YU Yi-ke College of Information Engineering University of Science and Technology Beijing Beijing 100083 China;Implementation of layered model based on evolutionary theory[J];Journal of Computer Applications;2010-08
8 ZHOU Qian,YU Jiong (School of Information Science & Engineering,Xinjiang University,Urumqi 830046,China);Dynamic trust model based on reputation and risk evaluation for trustworthy network[J];Application Research of Computers;2010-11
9 LIU Chao,WANG Wen-jie ( Graduate University of Chinese Academy of Sciences,Beijing 100049,China);Internetware model based on possible worlds and research of creditability[J];Application Research of Computers;2010-12
10 MAN Jun-feng1,2,YANG Lu-ming1,LI Chang-yun2,WEN Zhi-cheng21(College of Information Science and Technology,Central South University,Changsha 410083,China)2(College of Computer and Communication,Hunan University of Technology,Zhuzhou 412008,China);Research on Trust Analysis and Trend Prediction of Software Interactive Behavior[J];Journal of Chinese Computer Systems;2009-11
China Proceedings of conference Full-text Database 1 Hits
1 TAN Ying WANG Dan (College of Computer,Beijing University of Technology,Beijing 100124);Design and Implementation of Network Behavior Analysis System Based on Network Flow[A];[C];2010
【Secondary Citations】
Chinese Journal Full-text Database 5 Hits
1 LIN Chuang PENG Xue-Hai (Department of Computer Science and Technology, Tsinghua University, Beijing 100084);Research on Trustworthy Networks[J];Chinese Journal of Computers;2005-05
2 LIN Chuang 1) WANG Yang 1) LI Quan-Lin 2) 1) (Department of Computer Science and Technology, Tsinghua University, Beijing 100084) 2) (Department of Industrial Engineering, Tsinghua University, Beijing 100084);Stochastic Modeling and Evaluation for Network Security[J];Chinese Journal of Computers;2005-12
3 TIAN Li-Qin LIN Chuang(Department of Computer Science and Technology,Tsinghua University,Beijing 100084);A Kind of Game-Theoretic Control Mechanism of User Behavior Trust Based on Prediction in Trustworthy Network[J];Chinese Journal of Computers;2007-11
4 LIN Chuang+, REN Feng-Yuan (Department of Computer Science and Technology, Tsinghua University, Beijing 100084, China);Controllable, Trustworthy and Scalable New Generation Internet[J];Journal of Software;2004-12
5 XU Zhen1 SHEN Li-Hong2 WANG Dan1(1 State Key Laboratory of Information Security,Chinese Academyof Sciences,Beijing 100080,China;2 The Graduate University of the Chinese Academy of Sciences, Beijing 100049, China);LOIS grub:a configurable trusted booting system[J];Journal of the Graduate School of the Chinese Academy of Sciences;2008-05
©2006 Tsinghua Tongfang Knowledge Network Technology Co., Ltd.(Beijing)(TTKN) All rights reserved