Computer Science ›› 2015, Vol. 42 ›› Issue (12): 224-228.

Previous Articles     Next Articles

Trustworthy Software Distributing Mode Based on Software Description

LI Jian-fei, XU Kai-yong and JIN Lei   

  • Online:2018-11-14 Published:2018-11-14

Abstract: The present study of software distribution is mainly about the efficiency and integrity.For high security requirement of inner network environment,how to make use of trusted computing technology to ensure the safety and reliability of the software release has more important research significance.Because the software trust distribution is dynamic,namely the requirements of different users and platforms are different,and human configuration is inefficient and its safety and reliability cann’t be ensured,thus an intelligent release strategy among user,platform,software was put forward.The software function reliability algorithm can quantitatively calculate the degree of the software functions conforming with user requirements,and intelligent matching algorithm can generate installation sequence based on dependency to ensure running reliably.In order to describe the software information in the distribution process and meet the needs of distribution algorithm at the same time,we designed an SDDL (Software Distribution Description Language) based on XML.Analysis and application example demonstrate that the mode can indeed enhance the trust of software distribution.

Key words: Software description,Software trust distribution,Iintelligent distribution,Trusted computing

[1] 赵雨水,左青,杨立,等.软件发布机制体系结构研究[J].计算机工程与设计,2010,1(4):700-705 Zhao Yu-shui,Zuo Chun,Yang Li,et al.Architecture for software distribution[J].Computer Engineering and Design,2010,1(4):700-705
[2] 刘甜.软件发布机制的研究与应用[D].石家庄:石家庄铁道大学,2014(下转第262页)(上接第228页)Liu Tian.Research and Application of Software Distribution Mechanism[D].Shijiazhuang:Shijiazhuang Tiedao University,2014
[3] 王华,刘焕敏,冯朝阳,等.一种分布式软件发布部署系统[J].计算机系统应用,2012,21(2):1-4 Wang Hua,Liu Huan-min,Feng Zhao-yang,et al.Distributed Software Release and Disposition System[J].Computer Systems & Applications,2012,1(2):1-4
[4] 陈伟,魏峻,黄涛.W4H:一个面向软件部署的技术分析框架[J].软件学报,2012,23(7):1669-1687 Chen Wei,Wei Jun,Huang Tao.W4H:An Analytical Framework for Software Deployment Technologies[J].Journal of Software,2012,3(7):1669-1687
[5] Malek S,Medvidovic N,Mikic-Rakic M.An extensible framework for improving a distributed software system’s deployment architecture[J].IEEE Trans.on Software Engineering,2012,38(1):73-100
[6] 张娴.基于可信计算的软件安全下载设计与实现[D].西安:西安电子科技大学,2010 Zhang Xian.Design and Implement of Software Secure Downloading Based on Trusted Computing[D].Xi’an:Xidian University,2010
[7] Virvilis N,Gritzalis D.Trusted Computing vs Advanced Persistent Threats:Can a defender win this game?[C]∥2013 IEEE 10th International Conference on Ubiquitous Intelligence and Computing,and 10th International Conference on Autonomic and Trusted Computing (UIC/ATC).2013:396-403
[8] 蒋泽.可信网络中用户行为可信评估的研究[D].重庆:重庆大学,2011 Jiang Ze.Study on Evaluation of User Behavior Trust in Trusted Network[D].Chongqing:Chongqing University,2011
[9] 林闯,田立勤.可信网络中用户行为可信评价的研究[J].计算机研究与发展,2008,45(12):2033-2043 Lin Chuang,Tian Li-qin.Research on User Behavior Trust in Trustworthy Network[J].Journal of Computer Research and Development,2008,5(12):2033-2043
[10] 温博为.可信计算平台技术应用研究[D].西安:陕西师范大学,2013 Wen Bo-wei.Application Research on Trusted Computing Platform Technology[D].Xi’an:Shaanxi Normal University,2013
[11] 王志勇.基于行为声明的动态可信度量技术研究[D].北京:北京工业大学,2013 Wang Zhi-yong.Dynamic Trustworthiness Measurement Technology Based on Behavior Declaration[D].Beijing:Beijing University of Technology,2013
[12] 曾梦岐,卿昱,谭平璋,等.一种基于标识认证的信任链建立方法[C]∥第一届中国可信理论与实践学术会议论文集.北京:清华大学出版社,2009 Zeng Meng-qi,Qing Yu,Tan Ping-zhang,et al.Establishment Method of Trust Chain Based on Identity Authentication[C]∥Proceedings of the first China credible theory and practice conference.Beijing:Tsing Hua University Press,2009
[13] 孙迪.软件行为可信技术研究[D].北京:北京工业大学,2013 Sun Di.Research on Software Behavior Trustworthy Technology[D].Beijing:Beijing University of Technology,2013
[14] Ruiz J L,Duenas J C,Usro F,et al.Deployment in dynamic environments[C]∥DECOR04 (2004).2004:85-98
[15] Hall R,Heimbigner D,Wolf A L.Specifying the DeployableSoftware Description Format in XML: CU-SERL-207-99[R].Software Engineering Research Laboratory,University of Colorado,1999
[16] Hall R S,Heimbigner D,Wolf A L.Evaluating Software Deployment Languages and Schema[C]∥14th IEEE InternationalConference on Software Maintenance (ICSM’98).1998:177
[17] Van Hoff A,Partovi H,Thai T.The Open Software DescriptionFormat (OSD).http://www.w3.org /TR/NOTE-OSD
[18] Distributed Management Task Force.Common InformationModel (CIM) Specification(Version 3.0).http://www.dmtf.org/spec/cim_spec_v30
[19] Coupaye T,Estublier J.Foundations of enterprise software deployment[C]∥Proc.of the Euromicro Conf.on Software Maintenance and Reengineering.Zurich:IEEE Computer Society,2000
[20] 王怀民,唐扬斌,尹刚,等.互联网软件的可信机理[J].中国科学(E辑),2006,36(10):1156-1169 Wang Huai-min,Tang Yang-bin,Yin Gang,et al.Trustworthiness Mechanism of Internet Software[J].Science in China (Series E),2006,6(10):1156-1169

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!