Using the Trusted Platform Module to Enhance OVAL Driven Assessments

ثبت نشده
چکیده

Introduction Recently, MITRE/SEDI developed a new draft component schema for OVAL to support interaction with the Trusted Platform Module (TPM). At a basic level, this is no different than most other component schemas: it simply expands OVAL's ability to collect system state information into a new component. However, because of some of the unique features of the TPM, this expansion of OVAL also supports a greater degree of trust in the results provided by an OVAL assessment. This document is intended to educate the OVAL community about TPMs in general and about the exciting possibilities made possible by OVAL interactions with the TPM.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Threat Model of a Scenario Based on Trusted Platform Module 2.0 Specification

The Trusted Platform Module (TPM) is a device that can be used to enhance the security of web applications. However, the TPM has to be used in a proper manner in order to benefit from its security properties. A threat model will contribute towards developing a better understanding of how to use the TPM and serve as a reference for future work. In this paper, a web application scenario based on ...

متن کامل

Augmenting Internet-based Card Not Present Transactions with Trusted Computing

In this paper, we demonstrate how Trusted Computing technology can be used to enhance the security of Internet-based Card Not Present (CNP) transactions. We take a pragmatic approach, focusing here on exploiting features of Trusted Computing as it is being deployed today. Thus we rely only on the presence of client-side Trusted Platform Modules, rather than upon the “idealised” deployment in wh...

متن کامل

Augmenting Internet-Based Card Not Present Transactions with Trusted Computing (Extended Abstract)

In this paper, we demonstrate how Trusted Computing technology can be used to enhance the security of Internet-based Card Not Present (CNP) transactions. We take a pragmatic approach, focusing here on exploiting features of Trusted Computing as it is being deployed today. Thus we rely only on the presence of client-side Trusted Platform Modules, rather than upon the “idealised” deployment in wh...

متن کامل

Privacy Preserving Trust Agents

A Trust Agent is an assembly of software components arranged to provide trusted remote entities access and control over certain aspects of a user's end system, in a privacy preserving manner. The Trust Agent recognising the end user as the platform owner, and consequently the owner of any personal information held on the platform. In this paper we describe two scenarios (one domestic, the other...

متن کامل

Innovations in Teaching: Using Moodle E-learning Platform in the Development of a Curriculum for the Undergraduate Course Consecutive Interpreting to Enhance Interactions among Learners

This study was conducted to remedy the shortcomings of the curriculum that the authors had developed for the course Consecutive Interpreting. The curriculum had been designed adopting a social constructivist framework and implemented for a semester to detect the imperfections. Since the main problems centered on the paucity of learners' interactions and the limitedness of the existing interacti...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2011