• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Liu Changping, Fan Mingyu, and Wang Guangwei. Integrity Measurement Model According to Needs Under Open Network Environment[J]. Journal of Computer Research and Development, 2011, 48(2): 317-326.
Citation: Liu Changping, Fan Mingyu, and Wang Guangwei. Integrity Measurement Model According to Needs Under Open Network Environment[J]. Journal of Computer Research and Development, 2011, 48(2): 317-326.

Integrity Measurement Model According to Needs Under Open Network Environment

More Information
  • Published Date: February 14, 2011
  • Integrity measurement is a hot research topic in trusted computing. The potential defects of the existing integrity measurement models under open network environment are analyzed. Aiming at these defects, an on-command model for integrity measurement is proposed. In this model, interrogators define their policy of integrity measurement according to their own security needs. Measurement policy is made up of code and data flow integrity measurement policy. Interrogatee only measure the integrity of relevant components defined in measurement policy, not all possible components in interrogee. Interrogee maybe was inquired from many interrogators simultaneously and should construct special instance of integrity measurement for each interrogator. Compared with the existing models, the noticeable point of this model is the self-defining measurement policy, which provides enough convenience to meet interrogators needs. Meanwhile, this model supported integrity measurement of both code and data flow, which overcome the one-sided defect of measuring partial object. Remote attestation and prototype system based on this model are built in a stream media service network. In this network, servers measure the integrity of clients media player before service, and measure the integrity of media data during service. The experiment under stream media service network indicate that this model has solved the existing problems and could be adapted to open network environment with acceptable performance cost.
  • Related Articles

    [1]Kong Hao, Lu Wenyan, Chen Yan, Yan Guihai, Li Xiaowei. Survey of Sort Acceleration Methods on FPGA[J]. Journal of Computer Research and Development, 2024, 61(3): 780-798. DOI: 10.7544/issn1000-1239.202220789
    [2]Zeng Weixin, Zhao Xiang, Tang Jiuyang, Tan Zhen, Wang Wei. Iterative Entity Alignment via Re-Ranking[J]. Journal of Computer Research and Development, 2020, 57(7): 1460-1471. DOI: 10.7544/issn1000-1239.2020.20190643
    [3]Liu Linlan, Zhang Jiang, Shu Jian, Guo Kai, Meng Lingchong. Multiple Attribute Decision Making-Based Prediction Approach of Critical Node for Opportunistic Sensor Networks[J]. Journal of Computer Research and Development, 2017, 54(9): 2021-2031. DOI: 10.7544/issn1000-1239.2017.20160645
    [4]Shi Song, Li Hongliang, Zhu Wei. Efficient Merge Sort Algorithms on Array-Based Manycore Architectures[J]. Journal of Computer Research and Development, 2016, 53(2): 362-373. DOI: 10.7544/issn1000-1239.2016.20148246
    [5]Li Ximing, Yang Bo, Guo Yubin, Yao Jintao. A New Key Hiding Scheme Based on Fingerprint[J]. Journal of Computer Research and Development, 2013, 50(3): 532-539.
    [6]Chen Hui, Yin Jianping, and Zhu En. A Method to Adjust Minutiae Location and Direction in Nonlinear Distorted Fingerprint Image[J]. Journal of Computer Research and Development, 2010, 47(12).
    [7]Hao Fanchang, Luan Junfeng, Zhu Daming, Zhang Peng, and Li Ming. A Faster Algorithm for Sorting Genomes by Reciprocal Translocation, Insertion and Deletion[J]. Journal of Computer Research and Development, 2010, 47(11): 2011-2023.
    [8]Yang Lei and Song Tao. The Array-Based Bucket Sort Algorithm[J]. Journal of Computer Research and Development, 2007, 44(2): 341-347.
    [9]Yin Yilong, Zhang Hongwei, and Liu Ning. Fingerprint Matching Based on Delaunay Triangulation[J]. Journal of Computer Research and Development, 2005, 42(9): 1622-1627.
    [10]Qin Liangxi, Shi Zhongzhi. SFP-Max—A Sorted FP-Tree Based Algorithm for Maximal Frequent Patterns Mining[J]. Journal of Computer Research and Development, 2005, 42(2): 217-223.

Catalog

    Article views (645) PDF downloads (550) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return