Improving End-user Security and Trustworthiness of TCG-Platforms
نویسندگان
چکیده
Over the last two years, the computing industry has started various initiatives to increase computer security be means of new hardware. The most notable effort is the Trusted Computing Group (TCG, former TCPA), which unites most important companies to develop a standard for security hardware. While efforts towards more security are generally appreciated, the new technology has raised fears that the user will lose control over his platform, and that its extensive use would harm competition in several areas of IT technology. In this paper, technical modifications to the TCPA Specification (based on version 1.1b) are suggested. If implemented, these suggestions would eliminate the potential to abuse the technology against the users. To the best of our knowledge, none of the intended use cases of the TCG would be affected. The proposals will be discussed with TCG Members on the GI annual conference 2003 in Frankfurt and then officially presented to the TCG.
منابع مشابه
An Effective Approach for Remote Attestation in Trusted Computing
The e-commerce demands end-user systems that adhere to well-defined security policies. In this context Trusted Computing is a new security solution proposed by the Trusted Computing Group Trusted Computing (TC). It aims at providing a framework and effective mechanisms that allow computing platforms and a distributed system to gain assurance about each other’s integrity and trustworthiness. In ...
متن کاملTCG Based Approach for Secure Management of Virtualized Platforms State - of - the - art ( June 05 , 2010 )
There is a strong trend shift in the favor of adopting virtualization to get business benefits. The provisioning of virtualized enterprise resources is one kind of many possible scenarios. Where virtualization promises clear advantages it also poses new security challenges which need to be addressed to gain stakeholders confidence in the dynamics of new environment. One important facet of these...
متن کاملThe Role of Platform Integrity in Trustworthy Systems
This presentation discusses the role of platform integrity in platform security trustworthiness while reviewing a few basic tenants for hardware requirements to enable and support successful applications. Users demand that applications and platforms strike a delicate balance between hardware and software utility. Platforms, and their associated applications, that are too difficult or complex fo...
متن کاملPrediction of user's trustworthiness in web-based social networks via text mining
In Social networks, users need a proper estimation of trust in others to be able to initialize reliable relationships. Some trust evaluation mechanisms have been offered, which use direct ratings to calculate or propagate trust values. However, in some web-based social networks where users only have binary relationships, there is no direct rating available. Therefore, a new method is required t...
متن کاملDeploying Virtual Machines on Shared Platforms (Security Management
In this report, we describe mechanisms for platforms looking into a telecommunication cloud architecture we present focuses scenario we present. This report security mechanisms and protocols, leveraging existing standards and s applicable. In particular, our architecture uses TCG technologies for trust establishment in the deployment of operator virtual machines on shared resource platforms. We...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2003