Formal Definitions for Trust in Trusted Computing

Trust, the most fundamental concept in Trusted Computing, is a pervasive notion and, as such, has been studied thoroughly in a variety of different fields. Based on a survey of trust and security, two formal definitions for trust in Trusted Computing are presented in this paper: one for trust between coequal components (the direct trust) and the other for trust in specialization-employed environment (the recommended trust). Therefore, the rationality of the properties of trust relation has been comprehensively discussed in detail, such as reflexive, symmetric, and conditionally transitive. Finally, several prospective insights are proposed towards modeling a trusted system on basis of those definitions.

[1]  Morris Sloman,et al.  A survey of trust in internet applications , 2000, IEEE Communications Surveys & Tutorials.

[2]  Sergey Bratus,et al.  TOCTOU, Traps, and Trusted Computing , 2008, TRUST.

[3]  G Stoneburner Underlying Technical Models for Information Technology Security | NIST , 2001 .

[4]  Zhaoyu Liu,et al.  A Formal Definition for Trust in Distributed Systems , 2005, ISC.

[5]  M. Sloman,et al.  A Survey of Trust in Internet Applications I E E E C O M M U N I C a T I O N S , 2000 .

[6]  Zhang Huanguo,et al.  Development of trusted computing research , 2008, Wuhan University Journal of Natural Sciences.

[7]  Ravi S. Sandhu,et al.  Role-Based Access Control Models , 1996, Computer.

[8]  Vladimiro Sassone,et al.  A formal model for trust in dynamic networks , 2003, First International Conference onSoftware Engineering and Formal Methods, 2003.Proceedings..

[9]  N. L. Chervany,et al.  THE MEANINGS OF TRUST , 2000 .

[10]  Zhenfu Cao,et al.  Survey of information security , 2007, Science in China Series F: Information Sciences.

[11]  Gary Stoneburner,et al.  Underlying technical models for information technology security :: recommendations of the National Institute of Standards and Technology , 2001 .

[12]  William J. Caelli,et al.  50 Years of Isolation , 2009, 2009 Symposia and Workshops on Ubiquitous, Autonomic and Trusted Computing.

[13]  Leendert van Doorn,et al.  A Practical Guide to Trusted Computing , 2007 .

[14]  Jaehong Park,et al.  The UCONABC usage control model , 2004, TSEC.

[15]  Bo Zhao,et al.  Research on trusted computing and its development , 2010, Science China Information Sciences.

[16]  Xing Zhang,et al.  A Novel Secure Terminal System Based on Trusted Hardware: U-Key , 2009, J. Comput..

[17]  Dilsun Kirli Kaynar,et al.  A Logic of Secure Systems and its Application to Trusted Computing , 2009, 2009 30th IEEE Symposium on Security and Privacy.

[18]  Audun Jøsang,et al.  The right type of trust for distributed systems , 1996, NSPW '96.