Abstract—The guaranty of trustiness wasn’t considered enough in traditional software development methods, the software developed in that methods lack effective measures for ensuring its trustiness. Combining agent technique with the support of trusted computing provided by TPM, a trusted software constitution model based on Trust Engine (TSCMTE) is demonstrated in this paper, Trust Engine extends the “chain of trust ” of TCG into application, and cooperates with TPM to perform integrity measurement for software entity to ensure the static trustiness, then through verifying whether the dynamic behavior of software satisfies the trustiness constraints at runtime, Trust Engine guarantees the dynamic trustiness of software behavior. For the pur...
Validation is critical to the success of software trustworthiness measurement. A large number of sof...
As the virtual mirror of complex real-time business processes of organisations’ underlying informati...
Abstract. In the near future, computing devices will be present in most artefacts, will considerably...
This paper extends the software trustworthiness evidence framework to include the runtime software t...
User's trust is a major factor relating to how confident users are with a system, how well they...
AbstractTo industry software Trustworthiness problem, an idea aiming to business to construct indust...
Aiming at the real-time requirements for industrial control systems, we proposed a corresponding tru...
Developing trusted softwares has become an important trend and a natural choice in the development o...
The Trusted Computing Base (TCB) describes the part of an IT system that is responsible for enforcin...
Due to the widespread trust threat under the open and dynamic Internet environment, the computer com...
The need for trustworthy system operation has been acknowledged in many circles. However, establishi...
Trust is an absolute necessity for digital communications; but is often viewed as an implicit singul...
Developing trusted softwares has become an important trend and a natural choice in the development o...
We describe the application of our collaboration-oriented software engineering approach for the desi...
As the early design decision-making structure, a software architecture plays a key role in the final...
Validation is critical to the success of software trustworthiness measurement. A large number of sof...
As the virtual mirror of complex real-time business processes of organisations’ underlying informati...
Abstract. In the near future, computing devices will be present in most artefacts, will considerably...
This paper extends the software trustworthiness evidence framework to include the runtime software t...
User's trust is a major factor relating to how confident users are with a system, how well they...
AbstractTo industry software Trustworthiness problem, an idea aiming to business to construct indust...
Aiming at the real-time requirements for industrial control systems, we proposed a corresponding tru...
Developing trusted softwares has become an important trend and a natural choice in the development o...
The Trusted Computing Base (TCB) describes the part of an IT system that is responsible for enforcin...
Due to the widespread trust threat under the open and dynamic Internet environment, the computer com...
The need for trustworthy system operation has been acknowledged in many circles. However, establishi...
Trust is an absolute necessity for digital communications; but is often viewed as an implicit singul...
Developing trusted softwares has become an important trend and a natural choice in the development o...
We describe the application of our collaboration-oriented software engineering approach for the desi...
As the early design decision-making structure, a software architecture plays a key role in the final...
Validation is critical to the success of software trustworthiness measurement. A large number of sof...
As the virtual mirror of complex real-time business processes of organisations’ underlying informati...
Abstract. In the near future, computing devices will be present in most artefacts, will considerably...