SALIVATE A Secure Architecture for Loading , Initializing , and Verifying A Trusted Environment
نویسنده
چکیده
In a networked environment, it is unreasonable to assume that any system is completely impervious to attack. When a system is compromised, however, system administrators would like to restore it to a trusted state. By utilizing a guaranteed boot sequence, the problem of restoring a compromised system is reduced to the simple task of rebooting the machine. This paper presents a flexible architecture for a secure boot and imaging process that ensures a server always boots into a trusted state, without making any assumptions about its previous condition.
منابع مشابه
Secure Application Execution in Mobile Devices
Smart phones have rapidly become hand-held mobile devices capable of sustaining multiple applications. Some of these applications allow access to services including healthcare, financial and online social networks and are becoming common in the smart phone environment. From a security and privacy point of view, this seismic shift is creating new challenges, as the smart phone environment is bec...
متن کاملA Mobile and Fog-based Computing Method to Execute Smart Device Applications in a Secure Environment
With the rapid growth of smart device and Internet of things applications, the volume of communication and data in networks have increased. Due to the network lag and massive demands, centralized and traditional cloud computing architecture are not accountable to the high users' demands and not proper for execution of delay-sensitive and real time applications. To resolve these challenges, we p...
متن کاملClient-side access control enforcement using trusted computing and PEI models
It has been recognized for some time that software alone does not provide an adequate foundation for building a high-assurance trusted platform. The emergence of industry-standard trusted computing technologies promises a revolution in this respect by providing roots of trust upon which secure applications can be developed. These technologies offer a particularly attractive platform for securit...
متن کاملSecure Routing Protocol: Affection on MANETs Performance
In mobile ad hoc networks, the absence ofinfrastructure and the consequent absence of authorizationfacilities impede the usual practice of establishing a practicalcriterion to distinguishing nodes as trusted and distrusted.Since all nodes in the MANETs would be used as router inmulti-hop applications, secure routing protocols have vital rulein the security of the network. So evaluating the perf...
متن کاملResearch of Trusted Network Architecture in Wireless sensor Networks
Recently, there are many trust management solutions are proposed for wireless sensor networks. Current decentralized trust-management research focuses mainly on trust models and algorithms, whereas trust evaluation isn’t related with certainty specific application. But, in WSNs the trust management solutions should adapt to different application scenarios. In addition, potential merits of hardw...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2005