DocumentCode :
2081071
Title :
Privacy and trusted computing
Author :
Reid, Jason ; Nieto, Juan M González ; Dawson, Ed ; Okamoto, Eiji
Author_Institution :
Inf. Security Res. Centre, Queensland Univ. of Technol., Australia
fYear :
2003
fDate :
1-5 Sept. 2003
Firstpage :
383
Lastpage :
388
Abstract :
This paper examines a model of trusted computing wherein a computing platform is able to make assertions about its current software configuration that may be trusted by the user and remote third parties. The privacy implications of this approach are investigated in the context of the Trusted Computing Platform Alliance (TCPA) specification. The trust relationships of the TCPA architecture are examined in detail. An analysis of the revocation requirements inherent in the TCPA design is presented, which highlights the challenges that revocation presents in the context of a large scale deployment of TCPA platforms. Finally, a modification to the specification is suggested that reduces the level of trust that need to be placed on the Privacy CA.
Keywords :
cryptography; data privacy; formal specification; large-scale systems; telecommunication security; TCPA specification; Trusted Computing Platform Alliance; computing platform; privacy management; revocation requirements; software configuration; trusted computing; Acceleration; Application software; Computer architecture; Computer network reliability; Computer networks; Information security; Large-scale systems; Operating systems; Personal communication networks; Privacy;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Database and Expert Systems Applications, 2003. Proceedings. 14th International Workshop on
ISSN :
1529-4188
Print_ISBN :
0-7695-1993-8
Type :
conf
DOI :
10.1109/DEXA.2003.1232052
Filename :
1232052
Link To Document :
بازگشت