Trusted Computing in Embedded Systems Workshop
نویسنده
چکیده
The ideas and findings in this report should not be construed as an official DoD position. It is published in the interest of scientific and technical information exchange. Use of any trademarks in this report is not intended in any way to infringe on the rights of the trademark holder. Internal use. Permission to reproduce this document and to prepare derivative works from this document for internal use is granted, provided the copyright and " No Warranty " statements are included with all reproductions and derivative works. External use. This document may be reproduced in its entirety, without modification, and freely distributed in written or electronic form without requesting formal permission. Permission is required for any other external and/or commercial use. a federally funded research and development center. The Government of the United States has a royalty-free government-purpose license to use, duplicate, or disclose the work, in whole or in part and in any manner, and to have or permit others to do so, for government purposes pursuant to the copyright license under the clause at 252.227-7013. Abstract vii 1 Introduction 1 2 Workshop Goals 2 3
منابع مشابه
Using Trusted Computing for enhancing Embedded Computing Platforms
Overview: The Trusted Computing (TC) technology is today already widely applied on Personal Computer (PC) oriented platforms. Typical use scenarios are measuring system integrity for Trusted Operating Systems, secure storage for key material and certificates, identification of platforms and together with other technology like smartcards and biometrics also the authentication and identification ...
متن کاملComposition of Embedded Systems. Scientific and Industrial Issues, 13th Monterey Workshop 2006, Paris, France, October 16-18, 2006, Revised Selected Papers
By reading, you can know the knowledge and things more, not only about what you get from people to people. Book will be more trusted. As this composition of embedded systems scientific and industrial issues 13th monterey workshop 2006 paris france october 16 18 2006 revised selected papers lecture notes in computer science, it will really give you the good idea to be successful. It is not only ...
متن کاملA Trusted Computing Base for Embedded Systems
The structure of many secure systems has been based on the idea of a security kernel—an operating system nucleus that performs all trusted functions. The difficulty with this approach is that the security kernel tends to be rather large, complex, and unstructured. This paper proposes an alternative structure for secure embedded systems. The structure comprises three layers. At the bottom is a D...
متن کاملTrusted Computing: The TCG Trusted Platform Module Specification
In recent years, the necessity, functionality and new possibilities of trusted computing, especially the new standard from the Trusted Computing group (TCG) have been a hot topic of discussion in many forums. Also a lot of fears and misgivings in special for the use in PC environments have been provoked. In the meantime this technology has come of age, initial standards have been agreed upon an...
متن کامل