• 综合
  • 标题
  • 关键词
  • 摘要
  • 学者
  • 期刊-刊名
  • 期刊-ISSN
  • 会议名称
搜索

作者:

Wang, Dan (Wang, Dan.) | Wu, Yi (Wu, Yi.)

收录:

EI Scopus

摘要:

TPCM is an essential part for a trusted computer. How to test and evaluate whether the trusted function can execute in a trusted computer is very significant. A risk assessment model for TPCM based on threat analysis is proposed, which considers comprehensively the essential factors of the information security risk assessment, including the asset, threat and vulnerability of TPCM. The risk computation model is built through analyzing the threat identify, threat consequence attribute and threat index. The risk can be given through the computation of possibility of the threat and their consequence attributes with different weights. By applying the security risk assessment into TPCM, the effectiveness and measurability of the risk assessment process can be improved, which also provides a new approach for the test of the TPCM. © 2011 IEEE.

关键词:

Risk assessment Trusted computing

作者机构:

  • [ 1 ] [Wang, Dan]College of Computer Science, Beijing University of Technology, Beijing, China
  • [ 2 ] [Wu, Yi]College of Computer Science, Beijing University of Technology, Beijing, China

通讯作者信息:

电子邮件地址:

查看成果更多字段

相关关键词:

来源 :

年份: 2011

页码: 3540-3543

语种: 中文

被引次数:

WoS核心集被引频次: 0

SCOPUS被引频次:

ESI高被引论文在榜: 0 展开所有

万方被引频次:

中文被引频次:

近30日浏览量: 3

在线人数/总访问数:160/2889943
地址:北京工业大学图书馆(北京市朝阳区平乐园100号 邮编:100124) 联系我们:010-67392185
版权所有:北京工业大学图书馆 站点建设与维护:北京爱琴海乐之技术有限公司