• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Tian Junfeng, Li Zhen, Liu Yuling. An Design Approach of Trustworthy Software and Its Trustworthiness Evaluation[J]. Journal of Computer Research and Development, 2011, 48(8): 1447-1454.
Citation: Tian Junfeng, Li Zhen, Liu Yuling. An Design Approach of Trustworthy Software and Its Trustworthiness Evaluation[J]. Journal of Computer Research and Development, 2011, 48(8): 1447-1454.

An Design Approach of Trustworthy Software and Its Trustworthiness Evaluation

More Information
  • Published Date: August 14, 2011
  • With the continuous deepening of the application of software in sensitive fields such as finance, military affairs and economy, the requirement of software trustworthiness becomes more urgent. For the problem of the trust chain of Trusted Computing Group (TCG), which mainly ensure the static trustworthiness of computers and cannot ensure the dynamic trustworthiness of running software, we extend the trust chain of TCG by introducing a trustworthy engine between operating system and application software, and present a trust chain model of trustworthy software driven by the trustworthy engine. We also present an approach of trustworthy software design and its trustworthiness evaluation policies based on the trust chain model of trustworthy software. The software trustworthiness is merged into software design by introducing the trustworthy view which describes the trustworthy behavior trace of software and inserting checkpoint sensor at each checkpoint of trustworthy software. The software trustworthiness is realized by measuring software integrity and monitoring the behavior trace of running software. Experiments and analysis show that the trustworthy software designed with our approach can detect the anomaly of running software effectively, and the ability to detect the anomaly of software successfully of our designed software is better than that of the software based on the trust chain of TCG.
  • Related Articles

    [1]Zhang Wei, Han Linyu, Zhang Dianlei, Ren Pengjie, Ma Jun, Chen Zhumin. GeoPMF: A Distance-Aware Tour Recommendation Model[J]. Journal of Computer Research and Development, 2017, 54(2): 405-414. DOI: 10.7544/issn1000-1239.2017.20150822
    [2]Xin Wei, Sun Huiping, Chen Zhong. Analysis and Design of Distance-Bounding Protocols for RFID[J]. Journal of Computer Research and Development, 2013, 50(11): 2358-2366.
    [3]Yang Liu, Yu Jian, Jing Liping. An Adaptive Large Margin Nearest Neighbor Classification Algorithm[J]. Journal of Computer Research and Development, 2013, 50(11): 2269-2277.
    [4]Zhao Xiaoming, Ye Xijian. A New Approach to Ridgelet Transform[J]. Journal of Computer Research and Development, 2008, 45(5): 915-922.
    [5]He Honghui, Wang Lizhen, and Zhou Lihua. pgi-distance: An Efficient Method Supporting Parallel KNN-join Process[J]. Journal of Computer Research and Development, 2007, 44(10): 1774-1781.
    [6]Liu Bing, Wang Wei, and Shi Baile. The Tight Estimation Distance Using Wavelet[J]. Journal of Computer Research and Development, 2006, 43(10): 1732-1737.
    [7]Ming Xing, Liu Yuanning, Zhu Xiaodong, Xu Tao. Iris Recognition Based on Wavelet Transform with Shift Invariance Preprocessing[J]. Journal of Computer Research and Development, 2006, 43(7): 1186-1193.
    [8]Song Chuanming, Wang Xianghai. A Shape Adaptive Integer Wavelet Coding Algorithm Based on New Quantization Scheme[J]. Journal of Computer Research and Development, 2006, 43(4): 695-701.
    [9]Ji Qijin and Dong Yongqiang. Self-Similar Traffic Synthesizing Using Gaussian Mixture Model in Wavelet Domain[J]. Journal of Computer Research and Development, 2006, 43(3): 389-394.
    [10]Shang Zhaowei, Zhang Mingxin, Zhao Ping, Shen Junyi. Different Complex Wavelet Transforms for Texture Retrieval and Similarity Measure[J]. Journal of Computer Research and Development, 2005, 42(10): 1746-1751.

Catalog

    Article views (988) PDF downloads (510) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return