Unbalanced tree-formed verification data for trusted platforms

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Tree-formed verification data for trusted platforms

The establishment of trust relationships to a trusted platform relies on the process of validation. Validation allows an external entity to build trust in the expected behaviour of the platform based on provided evidence of the platform’s configuration. In a validation mechanism such as remote attestation, the trusted platform exhibits verification data created during a start up process. These ...

متن کامل

Secure Operations on Tree-Formed Verification Data

We define secure operations with tree-formed, protected verification data registers. Functionality is conceptually added to Trusted Platform Modules (TPMs) to handle Platform Configuration Registers (PCRs) which represent roots of hash trees protecting the integrity of tree-formed Stored Measurement Logs (SMLs). This enables verification and update of an inner node of an SML and even attestatio...

متن کامل

Improving Policy Verification Capabilities of Trusted Platforms

Verifiable trust is a desirable property for computing platforms – a user has a fundamental interest in knowing whether a computing platform about to be used behaves as expected. Current systems provide verifiable trust by taking immutable snapshots of a platform which digest the complex set of platform components and dependencies into relatively few measurements. Moreover, any change to the pl...

متن کامل

Trusted Mobile Platforms

This article addresses two main topics. Firstly, we review the operation of trusted computing technology, which now appears likely to be implemented in future mobile devices (including mobile phones, PDAs, etc.). Secondly, we consider the possible applications of this technology in mobile devices, and how these applications can be supported using trusted computing technology. We focus in partic...

متن کامل

Better Privacy for Trusted Computing Platforms

The trusted computing group (TCG) specified two protocols that allow a trusted hardware device to remotely convince a communication partner that it is indeed a trusted hardware device. In turn, This enables two communication partners to establish that the other end is a secure computing platform and hence it is safe exchange data. Both these remote identification protocols provide some degree o...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Security and Communication Networks

سال: 2015

ISSN: 1939-0114

DOI: 10.1002/sec.1385