{"title":"Research of network interconnection based on trust evaluation","authors":"Xiao-chuan Yin, Yibo Liu, Yan Fang","doi":"10.1109/WARTIA.2014.6976502","DOIUrl":null,"url":null,"abstract":"Problem of intranet security is almost birth with network interconnection, especially when the demand for network interconnection is booming throughout the world. The traditional technology can't guarantee the access terminals to its safe and reliable. In view of this, this paper introduces the trustworthiness evaluation technology in trusted computing. The collection and management model is established to deal with the evidences. Through analysing access terminals' own environment and behavior this paper puts forward a model of trust evaluation of tree type, and focuses on the analysis of decision attributes in the model. The model uses multi dimension attributes to determine the trusted access. Finally, the assessment model is analyzed and validated through a simulation experiment, and the results show that the evaluation model is feasible and effectiveness.","PeriodicalId":288854,"journal":{"name":"2014 IEEE Workshop on Advanced Research and Technology in Industry Applications (WARTIA)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2014-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2014 IEEE Workshop on Advanced Research and Technology in Industry Applications (WARTIA)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/WARTIA.2014.6976502","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1
Abstract
Problem of intranet security is almost birth with network interconnection, especially when the demand for network interconnection is booming throughout the world. The traditional technology can't guarantee the access terminals to its safe and reliable. In view of this, this paper introduces the trustworthiness evaluation technology in trusted computing. The collection and management model is established to deal with the evidences. Through analysing access terminals' own environment and behavior this paper puts forward a model of trust evaluation of tree type, and focuses on the analysis of decision attributes in the model. The model uses multi dimension attributes to determine the trusted access. Finally, the assessment model is analyzed and validated through a simulation experiment, and the results show that the evaluation model is feasible and effectiveness.