Open Access
MATEC Web Conf.
Volume 100, 2017
13th Global Congress on Manufacturing and Management (GCMM 2016)
Article Number 04023
Number of page(s) 6
Section Part 4: Equipment manufacturing and New materials
Published online 08 March 2017
  1. ITU-T Recommendation X. 509, ISO/IEC 9594-8. Information Technology. Open systems interconnection. The Directory: Public-key and Attribute Certificate Frameworks. Draft ITU-T Rec. X. 509, May, 2001: 22–44 [Google Scholar]
  2. Marsh S. P., Formalizing Trust as a computational Concept. Doctoral Dissertion, University of Stirling, 1994: 7–33 [Google Scholar]
  3. Almenarez F, Matin A, Diaz D, Sanchez J. Developing a model for trust management in pervasive devices. In: Bob Werner, ed, Proc of the 3rd IEEE Int’l Workshop on Pervasive Computing and Communication Security. Washington, IEEE, 2006: 245–250 [Google Scholar]
  4. Jameel H, Hung LX, Kalim U, Asjjad A, Lee SY, Lee YK. A trust model for ubiquitous systems based on vectors of trust values. In Proc of the 7th IEEE Int’1 Symp. on Multimedia. Washington: IEEE Computer Society Press, 2005: 674–679 [CrossRef] [Google Scholar]
  5. Sun Y, Yu W, Han Z, Liu KJR. Trust modeling and evaluation in ad hoc networks. In: Proc of the Global Telecommunications Conf, Globecom 2005. Washington: IEEE Computer Society Press, 2005: 1–10 [Google Scholar]
  6. Li DY, Meng HJ, Shi XM. Membership clouds and membership clouds generator. Journal of Computer Research and Development, 1995, 32, 6: 15–20 [Google Scholar]
  7. Sailer X Zhang, T Jaeger, L vail Doom, Design and implementation of TCG-based integrity measureme architecture. In Proceedings of USENIX Security Symposium. Lake Tahoe, California, USA: ACM Press, Aug. 2004: 223–238 [Google Scholar]
  8. Haldar D Chandra M Franz, Semantic remote attestation a virtual machine directed approach to trusted computing. In Proc of the Third virtual Machine Research a Technology Symposium. San Jose, CA, USA: USENIX, 2004: 29–41 [Google Scholar]
  9. Seshadri M, Luk E, Shi A, et al. Pioneer: verifying integrity and guaranteeing execution of code on legacy platforms. In the Proc ACM SIGOPS Operating Systems Review, SOSP’05, Brighton: ACM Press, 2005: 1–16 [CrossRef] [Google Scholar]
  10. Barka E.; Ravi Sandhu. Role-based delegation model/hierarchical roles (RBDM1). Computer Security Applications Conference, 2004. 20th Annual Digital Object Identifier: 10.1109/CSAC.2004.31 Publication Year: 2004: 396–404 [Google Scholar]
  11. Gang L X, Bei G. Unified Trusted Measurement Model of Trusted Network[C]// Industrial Control and Electronics Engineering (ICICEE), 2012 International Conference on. IEEE, 2012: 1082–1084. [Google Scholar]
  12. Yang L, Shi Y, Tang J. A trusted measurement scheme for wireless sensor networks[C]// Communication Software and Networks (ICCSN), 2015 IEEE International Conference on. IEEE, 2015. [Google Scholar]
  13. Gong B, Zhang J, Xiaolie Y E, et al. A Trusted Measurement Scheme Suitable for the Clients in the Trusted Network[J]. Wireless Communication Over Zigbee for Automotive Inclination Measurement China Communications, 2014, 11(4): 143–153. [Google Scholar]
  14. Ning Z H, Shen C X, Zhao Y, et al. Trusted measurement model based on multitenant behaviors.[J]. Scientific World Journal, 2013, 2014: 384967–384967. [Google Scholar]
  15. Chunlei W, Dongxia W, Yiqi D. Towards a Unified Framework for Network Survivability Measurement[C]//Proceedings of the 2010 Second International Conference on Networks Security, Wireless Communications and Trusted Computing - Volume 01. IEEE Computer Society, 2010: 129–134. [Google Scholar]
  16. Xiao Y, Cao J, Lai X, et al. Trusted network connect system based on tri-element peer authentication: US, US8191113[P]. 2012. [Google Scholar]
  17. Brickell E F. Method of using signatures for measurement in a trusted computing environment: US, US8631507[P]. 2014. [Google Scholar]
  18. Wang X, Liao G, Wang F, et al. Study of Rapeseed Information Website Trusted Measurement Based on Fuzzy Comprehensive Evaluation[J]. Chinese Agricultural Science Bulletin, 2015. [Google Scholar]
  19. Xin S Y, Zhao Y, Liao J H, et al. Dynamic trusted measurement model of operating system kernel[J]. Journal of Computer Applications, 2012, 32(4): 953–945. [CrossRef] [Google Scholar]
  20. Kanstrén T, Evesti A. Security Metrics, Secure Elements, and Operational Measurement Trust in Cloud Environments[M]// Security and Trust Management. Springer International Publishing, 2015. [Google Scholar]
  21. Tang Y, Zhang Y P, Chen H Y. Trusted Component Measurement Model Based on Specific Areas[J]. Computer & Modernization, 2014. [Google Scholar]
  22. Challener D C, Cromer D, Locker H, et al. Local verification of trusted display based on remote server verification: US, US8205248[P]. 2012. [Google Scholar]
  23. Horman N R T, Paris E L. Network access control for trusted platforms: US, US8832811[P]. 2014. [Google Scholar]
  24. Ning Z H, Shen C X, Zhao Y, et al. Trusted measurement model based on multitenant behaviors.[J]. Scientific World Journal, 2013, 2014: 384967–384967. [Google Scholar]

Current usage metrics show cumulative count of Article Views (full-text article views including HTML views, PDF and ePub downloads, according to the available data) and Abstracts Views on Vision4Press platform.

Data correspond to usage on the plateform after 2015. The current usage metrics is available 48-96 hours after online publication and is updated daily on week days.

Initial download of the metrics may take a while.