Beijing Municipal Key Laboratory of Trusted Computing

Beijing, China

Beijing Municipal Key Laboratory of Trusted Computing

Beijing, China
SEARCH FILTERS
Time filter
Source Type

Zhang W.,Beijing University of Technology | Zhang W.,Beijing Municipal Key Laboratory of Trusted Computing | Bao Z.,Beijing University of Technology | Zhang J.,Beijing University of Technology | And 3 more authors.
Huazhong Keji Daxue Xuebao (Ziran Kexue Ban)/Journal of Huazhong University of Science and Technology (Natural Science Edition) | Year: 2016

In order to prevent malicious users to deceive, the remote attestation scheme was proposed by validating user's attributes and platform status. On one hand, the scheme can ensure anonymity of the terminal platform, which avoid the user's identity and privacy information leakage. On the other hand, the scheme can make full use of the trusted platform control module and the trusted chain, to verify the hardware and firmware of the terminal and to verify reliability and efficiency of the software. In addition, user's prediction equation on behavior firstly was provided, which applied to vehicular cloud (VC) management module, and then the management module would compare user's real behavior and the prediction equation to get user's plausibility in the dynamic environment. The scheme realizes the user's remote attestation on VC efficiently. © 2016, Editorial Board of Journal of Huazhong University of Science and Technology. All right reserved.


Zhuang L.,Beijing University of Technology | Zhuang L.,Beijing Municipal Key Laboratory of Trusted Computing | Cai M.,Beijing University of Technology | Cai M.,Beijing Municipal Key Laboratory of Trusted Computing | And 2 more authors.
Beijing Gongye Daxue Xuebao/Journal of Beijing University of Technology | Year: 2012

To slow down reduction in availability caused by measurement granularity refinement, a model and the corresponding method of hierarchical verification of behavior trustworthiness were proposed based on concurrency theory. The sequential verification of platform behaviors in time in behavior-oriented trusted dynamic measurement was translated to the verification based on the hierarchical description of expected behaviors. The corresponding theorem ensured equivalence of translation. Efficiency analysis results show that hierarchical verification improves memory efficiency and verification efficiency, and enhances the feasibility of fine-grained trusted dynamic measurement.


Zhuang L.,Beijing University of Technology | Zhuang L.,Beijing Municipal Key Laboratory of Trusted Computing | Shen C.-X.,Beijing University of Technology | Shen C.-X.,Beijing Municipal Key Laboratory of Trusted Computing | And 2 more authors.
Jisuanji Xuebao/Chinese Journal of Computers | Year: 2014

In research on dynamic measurement of behavior trustworthiness of complex concurrent computer systems, how to solve state space explosion caused by fine grained dynamic measurement is a difficult point up to the present. Based on concurrency theory, we researched behavior trustworthiness of complex concurrent computer system and reduced the state space on the premise of ensuring reliability of measurement. We described behavior system through the model of Labeled Transition System and researched behavior relationship through the model of event structure, then we reconstructed all paths in the transition system according to the behavior relationship and combined like paths in order to reduce the set of transition relations and narrow the state space. The situation of state space explosion can be relaxed through the methods mentioned above and meanwhile, the behavior expectation of trusted dynamic measurement can be obtained according to the reduced state space, which enhances the feasibility of the method of fine grained trusted dynamic measurement applied in a complex system.


Wenbo Z.,Beijing University of Technology | Wenbo Z.,Beijing Municipal Key Laboratory of Trusted Computing | Pengfei Y.,Beijing University of Technology | Zhenshan B.,Beijing University of Technology | And 4 more authors.
Proceedings - 2014 International Conference on Identification, Information and Knowledge in the Internet of Things, IIKI 2014 | Year: 2014

Vehicular Computer Clouds (VCC) would be expected to play a major role in the Intelligent Transportation System (ITS) in the near future. While it is clear that the VCC concept raise exceptional security challenges. Generally speaking, most attacks come from operators. So it is important to design the novel VCC security scheme based on operator's attributes. In this paper, we develop the Fuzzy Operator-Attribute-Based Signcryption (FOABS), a novel security mechanism that makes relations between the vehicle operator's right and these operation. FOABS leverages fuzzy Attribute-Based encryption to enable data encryption, access control, and signature for vehicular control information in VCC. FOABS provides confidentiality, authenticity, undeniability, identity authentication, and collusion resistance. © 2014 IEEE.


Zhuang L.,Beijing University of Technology | Zhuang L.,Beijing Municipal Key Laboratory of Trusted Computing | Cai M.,Beijing University of Technology | Cai M.,Beijing Municipal Key Laboratory of Trusted Computing | And 2 more authors.
Jisuanji Yanjiu yu Fazhan/Computer Research and Development | Year: 2011

Trusted computing ensures trustworthiness of a platform through extending the trust boundary from the root to the whole platform. Trusted measurement is invoked before the trust boundary is extended from one entity to including another. Static measurement, which takes place at startup, cannot ensure runtime trustworthiness, and therefore dynamic trusted measurement is indispensable to guarantee a computer platform to run dependably. According to dependability, availability and security of information and behavior, targets of trusted measurement are established. In present schemes of dynamic trusted measurement, the measurement of functionality is focused on, whereas dependability cannot be guaranteed without the measurement of performance. Based on interactive Markov chains (IMC), the measurement of performance feature besides function feature is introduced. In the expected behavior description, the function expectation is described through a model of transition system and the performance expectation is described through relating path probability indicating dependability to the time expectation in which a certain specific behavior function is achieved. By comparing the runtime evidence of a platform with a specific expectation, trusted verification on a combination of functionality and performance is achieved. The trusted dynamic measurement model based on IMC ensures dependability in the feature of performance besides function and guarantees trustworthiness of a platform across the board.

Loading Beijing Municipal Key Laboratory of Trusted Computing collaborators
Loading Beijing Municipal Key Laboratory of Trusted Computing collaborators