High Assurance Policy-Based Key Management at Low Cost

نویسندگان

  • Tolga Acar
  • Lan Nguyen
چکیده

Past decade has witnessed the availability of Trusted Platform Modules (TPM) on commodity computers. While the most common use of TPM appears to be BitLocker on Windows OS, server class motherboards have not yet enjoyed a similar TPM deployment base. Recent research and products show that the TPM can provide a level of trust on locally executing software. Nonetheless, TPMs haven’t been utilized in data center cryptographic key management for higher levels of security assurance than software-only techniques. Hardware-based key management has so far been constrained to higher cost add-on hardware. We present a large scale policy-driven cryptographic key manager built with TPM security assurances. We describe our design principles and axioms, architecture and abstractions, security policy, and implementation. We create a role-based security model and express the model with SecPal security policy assertions. We describe our implementation of three roles, actions, resources, SecPal policies and tokens that combine them. Finally, we present our implementation results with SecPal proof graphs. Keywords-TPM; cryptography; key management; SecPal; policy language; data center

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

C3SM: Information Assurance Based on Cryptographic Checksum with Clustering Security Management Protocol

Wireless Sensor Networks (WSNs) are resource-constrained networks in which sensor nodes operate in an aggressive and uncontrolled environment and interact with sensitive data. Traffic aggregated by sensor nodes is susceptible to attacks and, due to the nature of WSNs, security mechanisms used in wired networks and other types of wireless networks are not suitable for WSNs. In this paper, we pro...

متن کامل

Credentials Management for High-Value Transactions

Partner key management (PKM) is an interoperable credential management protocol for online commercial transactions of high value. PKM reinterprets traditional public key infrastructure (PKI) for use in high-value commercial transactions, which require additional controls on the use of credentials for authentication and authorization. The need for additional controls is met by the use of partner...

متن کامل

A novel key management scheme for heterogeneous sensor networks based on the position of nodes

Wireless sensor networks (WSNs) have many applications in the areas of commercial, military and environmental requirements. Regarding the deployment of low cost sensor nodes with restricted energy resources, these networks face a lot of security challenges. A basic approach for preparing a secure wireless communication in WSNs, is to propose an efficient cryptographic key management protocol be...

متن کامل

Frailty Screening Tools: Frail Detection to Primary Assessment

Frailty is a vulnerable situation among older adults which can lead to unfavorable health outcomes such as falls, mortality, functional decline and institutionalization. The increasing number of elderly people and low rate of mortality has necessitated the need for high-quality medical services for this aging population, and this has led to a high cost of geriatric health care. There exist a hu...

متن کامل

Retaining Doctors in Rural Bangladesh: A Policy Analysis

Background Retaining doctors in rural areas is a challenge in Bangladesh. In this study, we analyzed three rural retention policies: career development programs, compulsory services, and schools outside major cities – in terms of context, contents, actors, and processes.   Methods Series of group discussions between policy-makers and researchers prompted the selection of policy areas, which wer...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2014