首页    期刊浏览 2024年07月06日 星期六
登录注册

文章基本信息

  • 标题:EVALUATION OF THE TPM USER AUTHENTICATION MODEL FOR TRUSTED COMPUTERS
  • 本地全文:下载
  • 作者:MARWAN ALSHAR�E ; ABDULLAH MOHD ZIN ; ROSSILAWATI SULAIMAN
  • 期刊名称:Journal of Theoretical and Applied Information Technology
  • 印刷版ISSN:1992-8645
  • 电子版ISSN:1817-3195
  • 出版年度:2015
  • 卷号:81
  • 期号:2
  • 出版社:Journal of Theoretical and Applied
  • 摘要:A number of previous researchers have discussed the vulnerability of TPM to physical attack and have proposed a number of solutions to solve these issues. Investigation have shown a number of flaws that these solutions suffers from. Trusted Platform Module User Authentication Model (TPM-UAM) is a model that was proposed and evaluated to overcome major safety issue that TPM found to be vulnerable to. A system prototype based on TPM-UAM was developed to prove the TPM-UAM ability to protect trusted computers protected by TPM. Expert review method depends on the understanding that experts are able to provide clear judgment and opinions from their experience and knowledge in their fields. The evaluation process consists of three sections, functionality evaluation, �can you break it?� test and usability evaluation. Three experts in an individual expert review method were asked to evaluate the system prototype in order to confirm the system correctness of design and implementation and also to evaluate the prototype as a reflection of the TPM-UAM and confirm the model ability to protect trusted computers protected by TPM. The evaluation process was conducted as planed and the system prototype was successfully evaluated. The results confirmed on the system�s correct design and implementation, also confirms the correct imitation and representation of the TPM-UAM model in a software prototype, as well as the system efficiency and ability to secure TPM. This paper describes the expert evaluation of software prototype based on TPM-UAM model. Three experts in the field of trusted computing and information security evaluated the system prototype individually in three evaluation sections includes functionality evaluation, �can you break it� test and usability evaluation. The evaluation results confirms the system correct design, ability to protect TPM and the reflection of the TPM-UAM model that the prototype system intended to represent.
  • 关键词:TPM; Expert Evaluation; Individual Expert Review; Heuristic Evaluation; Functional Evaluation.
国家哲学社会科学文献中心版权所有