Trends and Directions in Trusted Computing: Models, Architectures and Technologies
نویسندگان
چکیده
Until recently, all the security measures have addressed servers or networks while clients or network endpoints have missed the required security concerns relatively. Most of the mechanisms safeguarding endpoints (clients) are software based. Making endpoints survive in open and reasonably exposed environments-like internet-demand that client security should stand by a tried and true dependence and merely software based mechanisms are inadequate in providing the desired security level. Trusted Computing (TC) initiatives solve these security problems through operating environments, applications and secure hardware changes to the personal computer. Using secure hardware as a basis for trusted computing provides a level of relevance since hardware-based security is mooted difficult to compromise than conventional approaches. Therefore, TC provides a powerful set of features to implement applications such as secure auctions, integrity measurement, and biometric identifcation. In this paper, we present a detailed discussion of the different approaches towards a trusted computing platform; examine these approaches and provide a set of attack mechanisms enforced if trusted initiatives are not employed at user-level. The future directions along this line of research are also conferred.
منابع مشابه
مدل عملکردی تحلیلی FPGA برای پردازش با قابلیت پیکربندی مجدد
Optimizing FPGA architectures is one of the key challenges in digital design flow. Traditionally, FPGA designers make use of CAD tools for evaluating architectures in terms of the area, delay and power. Recently, analytical methods have been proposed to optimize the architectures faster and easier. A complete analytical power, area and delay model have received little attention to date. In addi...
متن کاملA Mobile and Fog-based Computing Method to Execute Smart Device Applications in a Secure Environment
With the rapid growth of smart device and Internet of things applications, the volume of communication and data in networks have increased. Due to the network lag and massive demands, centralized and traditional cloud computing architecture are not accountable to the high users' demands and not proper for execution of delay-sensitive and real time applications. To resolve these challenges, we p...
متن کاملA Critical Comparison of Trusted Computing and Trust Management Technologies
Mainly justified by the growing concern about vulnerabilities of IT systems, some new technologies are being integrated into computing devices, for realizing so-called Trusted Computing systems. However, they are raising questions about intrusive cyber-control over individual user activities and data, but also about consequences in cyber-war scenarios. The aim of this article is to confront Tru...
متن کاملClient-side access control enforcement using trusted computing and PEI models
It has been recognized for some time that software alone does not provide an adequate foundation for building a high-assurance trusted platform. The emergence of industry-standard trusted computing technologies promises a revolution in this respect by providing roots of trust upon which secure applications can be developed. These technologies offer a particularly attractive platform for securit...
متن کاملA Mobile service architecture utilising trusted computing
Convergence of access technologies potentially enables new mobile business scenarios. To enable them, trust between the stakeholders is a prerequisite, e.g., in the form of a cross-domain authentication infrastructure. Service architectures provide solutions for some of these needs. This paper proposes a use case combining the well understood techniques from the mobile domain with the upcoming ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2008