{"title":"可信应用软件管理方案研究","authors":"Huang Hong, Wang Chang-hui, Wang Ben","doi":"10.1109/NCIS.2011.70","DOIUrl":null,"url":null,"abstract":"In cognizance of the problem that application software was maliciously tampered, this paper proposes a management scheme of trusted application software. In this scheme, there is a Software Management Group (SMG) which is a trusted third party. SMG executes software credibility assessment and certification. Users communicate with SMG before they install or run software, get the installation certification and status indicators, to ensure that the software has not been tampered maliciously before installation and in the process of use. The proposal for this scheme provides a new idea and management mechanism for the chain of trust transmitting from Operating System to trusted applications in trusted computing. Principles and mechanisms of the scheme are described amply in this paper.","PeriodicalId":215517,"journal":{"name":"2011 International Conference on Network Computing and Information Security","volume":"25 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2011-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Research on Management Scheme of Trusted Application Software\",\"authors\":\"Huang Hong, Wang Chang-hui, Wang Ben\",\"doi\":\"10.1109/NCIS.2011.70\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In cognizance of the problem that application software was maliciously tampered, this paper proposes a management scheme of trusted application software. In this scheme, there is a Software Management Group (SMG) which is a trusted third party. SMG executes software credibility assessment and certification. Users communicate with SMG before they install or run software, get the installation certification and status indicators, to ensure that the software has not been tampered maliciously before installation and in the process of use. The proposal for this scheme provides a new idea and management mechanism for the chain of trust transmitting from Operating System to trusted applications in trusted computing. Principles and mechanisms of the scheme are described amply in this paper.\",\"PeriodicalId\":215517,\"journal\":{\"name\":\"2011 International Conference on Network Computing and Information Security\",\"volume\":\"25 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2011-05-14\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2011 International Conference on Network Computing and Information Security\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/NCIS.2011.70\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2011 International Conference on Network Computing and Information Security","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/NCIS.2011.70","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Research on Management Scheme of Trusted Application Software
In cognizance of the problem that application software was maliciously tampered, this paper proposes a management scheme of trusted application software. In this scheme, there is a Software Management Group (SMG) which is a trusted third party. SMG executes software credibility assessment and certification. Users communicate with SMG before they install or run software, get the installation certification and status indicators, to ensure that the software has not been tampered maliciously before installation and in the process of use. The proposal for this scheme provides a new idea and management mechanism for the chain of trust transmitting from Operating System to trusted applications in trusted computing. Principles and mechanisms of the scheme are described amply in this paper.