Unbalanced tree-formed verification data for trusted platforms
                    
                        
                            نویسندگان
                            
                            
                        
                        
                    
                    
                    چکیده
منابع مشابه
Tree-formed verification data for trusted platforms
The establishment of trust relationships to a trusted platform relies on the process of validation. Validation allows an external entity to build trust in the expected behaviour of the platform based on provided evidence of the platform’s configuration. In a validation mechanism such as remote attestation, the trusted platform exhibits verification data created during a start up process. These ...
متن کاملSecure Operations on Tree-Formed Verification Data
We define secure operations with tree-formed, protected verification data registers. Functionality is conceptually added to Trusted Platform Modules (TPMs) to handle Platform Configuration Registers (PCRs) which represent roots of hash trees protecting the integrity of tree-formed Stored Measurement Logs (SMLs). This enables verification and update of an inner node of an SML and even attestatio...
متن کاملImproving Policy Verification Capabilities of Trusted Platforms
Verifiable trust is a desirable property for computing platforms – a user has a fundamental interest in knowing whether a computing platform about to be used behaves as expected. Current systems provide verifiable trust by taking immutable snapshots of a platform which digest the complex set of platform components and dependencies into relatively few measurements. Moreover, any change to the pl...
متن کاملTrusted Mobile Platforms
This article addresses two main topics. Firstly, we review the operation of trusted computing technology, which now appears likely to be implemented in future mobile devices (including mobile phones, PDAs, etc.). Secondly, we consider the possible applications of this technology in mobile devices, and how these applications can be supported using trusted computing technology. We focus in partic...
متن کاملBetter Privacy for Trusted Computing Platforms
The trusted computing group (TCG) specified two protocols that allow a trusted hardware device to remotely convince a communication partner that it is indeed a trusted hardware device. In turn, This enables two communication partners to establish that the other end is a secure computing platform and hence it is safe exchange data. Both these remote identification protocols provide some degree o...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Security and Communication Networks
سال: 2015
ISSN: 1939-0114
DOI: 10.1002/sec.1385