Improving End-user Security and Trustworthiness of TCG-Platforms

نویسندگان

  • Klaus Kursawe
  • Christian Stüble
چکیده

Over the last two years, the computing industry has started various initiatives to increase computer security be means of new hardware. The most notable effort is the Trusted Computing Group (TCG, former TCPA), which unites most important companies to develop a standard for security hardware. While efforts towards more security are generally appreciated, the new technology has raised fears that the user will lose control over his platform, and that its extensive use would harm competition in several areas of IT technology. In this paper, technical modifications to the TCPA Specification (based on version 1.1b) are suggested. If implemented, these suggestions would eliminate the potential to abuse the technology against the users. To the best of our knowledge, none of the intended use cases of the TCG would be affected. The proposals will be discussed with TCG Members on the GI annual conference 2003 in Frankfurt and then officially presented to the TCG.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

An Effective Approach for Remote Attestation in Trusted Computing

The e-commerce demands end-user systems that adhere to well-defined security policies. In this context Trusted Computing is a new security solution proposed by the Trusted Computing Group Trusted Computing (TC). It aims at providing a framework and effective mechanisms that allow computing platforms and a distributed system to gain assurance about each other’s integrity and trustworthiness. In ...

متن کامل

TCG Based Approach for Secure Management of Virtualized Platforms State - of - the - art ( June 05 , 2010 )

There is a strong trend shift in the favor of adopting virtualization to get business benefits. The provisioning of virtualized enterprise resources is one kind of many possible scenarios. Where virtualization promises clear advantages it also poses new security challenges which need to be addressed to gain stakeholders confidence in the dynamics of new environment. One important facet of these...

متن کامل

The Role of Platform Integrity in Trustworthy Systems

This presentation discusses the role of platform integrity in platform security trustworthiness while reviewing a few basic tenants for hardware requirements to enable and support successful applications. Users demand that applications and platforms strike a delicate balance between hardware and software utility. Platforms, and their associated applications, that are too difficult or complex fo...

متن کامل

Prediction of user's trustworthiness in web-based social networks via text mining

In Social networks, users need a proper estimation of trust in others to be able to initialize reliable relationships. Some trust evaluation mechanisms have been offered, which use direct ratings to calculate or propagate trust values. However, in some web-based social networks where users only have binary relationships, there is no direct rating available. Therefore, a new method is required t...

متن کامل

Deploying Virtual Machines on Shared Platforms (Security Management

In this report, we describe mechanisms for platforms looking into a telecommunication cloud architecture we present focuses scenario we present. This report security mechanisms and protocols, leveraging existing standards and s applicable. In particular, our architecture uses TCG technologies for trust establishment in the deployment of operator virtual machines on shared resource platforms. We...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2003