Trust model in presence of trusted hardware
نویسندگان
چکیده
In this paper, the trust model for RE-TRUST WP3 is discussed.
منابع مشابه
GTrust: a group based trust model
Nowadays, the growth of virtual environments such as virtual organizations, social networks, and ubiquitous computing, has led to the adoption of trust concept. One of the methods of making trust in such environments is to use a long-term relationship with a trusted partner. The main problem of this kind of trust, which is based on personal experiences, is its limited domain. Moreover, both par...
متن کاملResearch of Trusted Network Architecture in Wireless sensor Networks
Recently, there are many trust management solutions are proposed for wireless sensor networks. Current decentralized trust-management research focuses mainly on trust models and algorithms, whereas trust evaluation isn’t related with certainty specific application. But, in WSNs the trust management solutions should adapt to different application scenarios. In addition, potential merits of hardw...
متن کاملAnalyzing Trusted Elements in Mobile Devices
Since last two decades, we have witnessed a significant trend from PC to mobile devices. The primary focus of this shift on mobile devices is making a device personal to the user, but, unfortunately, neglecting the trustworthiness of mobile devices. Mobile devices consist of many elements in hardware, software (firmware) and a combination of both. Some of these elements on mobile devices are tr...
متن کاملTowards a Trust Envisioned Cyber Security
Ensuring trust in cyber space has become an important and indispensable security challenge. Questions about trust in the physical space can be answered based on the factors namely closeness, time, analyzing actions and body language. But in the cyber space these factors are not readily available correctly to ensure and verify trust. Trust can also be established via a third party. But can we kn...
متن کاملNew Directions for Hardware-assisted Trusted Computing Policies (Position Paper)
The basic technological building blocks of the TCG architecture seem to be stabilizing. As a result, we believe that the focus of the Trusted Computing (TC) discipline must naturally shift from the design and implementation of the hardware root of trust (and the subsequent trust chain) to the higher-level application policies. Such policies must build on these primitives to express new sets of ...
متن کامل