A mobile and portable trusted computing platform
نویسندگان
چکیده
منابع مشابه
A mobile and portable trusted computing platform
The mechanism of establishing trust in a computing platform is tightly coupled with the characteristics of a specific machine. This limits the portability and mobility of trust as demanded by many emerging applications that go beyond the organizational boundaries. In order to address this problem, we propose a mobile and portable trusted computing platform in a form of a USB device. First, we d...
متن کاملAttacking a Trusted Computing Platform
We describe a flaw which we individuated in the Object-Independent Authorization Protocol (OIAP), an authorization protocol which represents one of the building blocks of the Trusted Platform Module (TPM), the core of the Trusted Computing Platform (TP) as devised by the Trusted Computing Group (TCG) standards. In particular we show that the protocol fails to protect messages exchanges against ...
متن کاملTrusted Mobile Devices: Requirements for a Mobile Trusted Platform Module
544 INTRODUCTION In recent years, mobile devices have replaced desktop PCs as the primary computing platform for many users. This trend is encouraged by convenient access to bank accounts, personal networks, and a wide range of networked resources through our tablets and mobile phones (see Fig. 1). Many organizations would like to use mobile devices in the work environment as a cost-savings and...
متن کاملTrusted Mobile Computing
Mobility leads to unplanned interactions between computer systems as people use devices to access services in varied environments. Before two systems agree to interact, they must trust that each will satisfy the security and privacy requirements of the other. In this paper we introduce trust overlays, a systematic approach to building such trust. Our solution exploits the increasing availabilit...
متن کاملA Mobile Trusted Platform Module (mTPM) Architecture
We present the architecture of a mobile Trusted Platform Module (mTPM). Current implementations of TPM architectures assume physical bindings between the TPM and a single hardware platform. In this paper we introduce an alternative where a TPM is bound to a single virtual machine (VM) on a portable device, following the specifications provided by the Trusted Computing Group (TCG). By communicat...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: EURASIP Journal on Wireless Communications and Networking
سال: 2011
ISSN: 1687-1499
DOI: 10.1186/1687-1499-2011-75