Challenges for Trusted Computing

被引:4
作者
Balfe, Shane [1 ]
Gallery, Eimear [1 ]
Mitchell, Chris J. [1 ]
Paterson, Kenneth G. [1 ]
机构
[1] Univ London, London WC1E 7HU, England
关键词
Public key cryptography;
D O I
10.1109/MSP.2008.138
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Some of the technical hurdles that might hinder trusted computing's widespread adoption, are discussed. Trusted computing is the collection of inter-related and interoperating technologies that when combined, help establish a more secure operating environment on commodity platforms. The most challenging is deploying and managing the Public key Infrastructure (PKI) necessary to enable general use of the security services that trusted computing supports. Another unresolved issue is standardization, as the parameters to be measured must be chosen so that each software component's integrity measurement can be uniquely identified. Isolation technologies allow a platform to be partitioned into isolated execution environments, thereby simplifying attestation-statement verification. The usability issues are a reflection of the general immaturity of trusted computing technology and the associated marketplace.
引用
收藏
页码:60 / 66
页数:7
相关论文
共 9 条
[1]  
Brickell E., 2004, P 11 ACM C COMPUTER, P132
[2]   PKI: It's not dead, just resting [J].
Gutmann, P .
COMPUTER, 2002, 35 (08) :41-+
[3]  
MCCUNE J, 2007, P 2 US WORKSH HOT TO
[4]  
PRICE G, 2005, RHULMA20058 DEP MATH
[5]  
Sadeghi Ahmad-Reza., 2004, NSPW 04 P 2004 WORKS, P67, DOI DOI 10.1145/1065907.1066038
[6]  
SADEGHI AR, 2006, P 1 ACM WORKSH SCAL, P47, DOI DOI 10.1145/1179474.1179487
[7]  
SINNOTT RO, 2006, US E SCI WORKSH P IN, P26
[8]  
SPARKS E, 2007, TR2007597 DARTM COLL
[9]  
Whitten A, 1999, USENIX ASSOCIATION PROCEEDINGS OF THE EIGHTH USENIX SECURITY SYMPOSIUM (SECURITY '99), P169