Flexible OS Support and Applications for Trusted Computing
نویسندگان
چکیده
Trusted computing (e.g. TCPA and Microsoft’s NextGeneration Secure Computing Base) has been one of the most talked about and least understood technologies in the computing community over the past year. The capabilities trusted computing provides have the potential to radically improve the security and robustness of distributed systems. Unfortunately, the debate over its application to digital rights management has caused its significant other applications to be largely overlooked. In this paper we present a broader vision for trusted computing. We give an intuitive model for understanding the capabilities and limitations of the mechanisms provided by trusted computing. We describe a flexible OS architecture to support trusted computing. We present a range of practical applications that illustrate how trusted computing can be used to improve security and robustness in distributed systems.
منابع مشابه
Trust and Protection in the Illinois Browser Operating System
Current web browsers are complex, have enormous trusted computing bases, and provide attackers with easy access to modern computer systems. In this paper we introduce the Illinois Browser Operating System (IBOS), a new operating system and a new browser that reduces the trusted computing base for web browsers. In our architecture we expose browser-level abstractions at the lowest software layer...
متن کاملTowards Secure Web
The Web is now the dominant platform for delivering interactive applications to hundreds of millions of users. Correspondingly, web browsers have become the de facto operating system for hosting these web-based applications (web apps). Unfortunately, web apps, browsers, and operating systems have all become popular targets for web-based attacks, intensifying the need for secure web browsing sys...
متن کاملTowards Trustworthy Virtualisation Environments: Xen Library OS Security Service Infrastructure
New cost effective commodity PC hardware now includes fully virtualisable processors and the Trusted Computing Group’s trusted platform module (TPM). This provides the opportunity to combine virtualisation, trusted computing and open source software development to tackle the security challenges modern computing faces. We believe that leveraging this technology to partition critical operating sy...
متن کاملApplication of Support Vector Machine Regression for Predicting Critical Responses of Flexible Pavements
This paper aims to assess the application of Support Vector Machine (SVM) regression in order to analysis flexible pavements. To this end, 10000 Four-layer flexible pavement sections consisted of asphalt concrete layer, granular base layer, granular subbase layer, and subgrade soil were analyzed under the effect of standard axle loading using multi-layered elastic theory and pavement critical r...
متن کاملOS Verification - Now!
Hard, machine-supported formal verification of software is at a turning point. Recent years have seen theorem proving tools maturing with a number of successful, real-life applications. At the same time, small highperformance OS kernels, which can drastically reduce the size of the trusted computing base, have become more popular. We argue that the combination of those two trends makes it feasi...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2003