DocumentCode :
3086694
Title :
An Approach to Establish Trusted Application
Author :
Isa, Mohd Anuar Mat ; Manan, Jamalul-lail Ab ; Sufian, Raja Mariam Ruzila Raja Ahmad ; Talib, A.A.
Author_Institution :
MIMOS Berhad, Kuala Lumpur, Malaysia
fYear :
2010
fDate :
22-23 Sept. 2010
Firstpage :
159
Lastpage :
164
Abstract :
Trusted Computing offer great opportunities to enhance security and privacy of the user. Trusted Platform Module (TPM) is the implementation of the trusted platform initiatives on a chip under Trusted Computing Group (TCG). The TPM chip that is similar to smart card but hardwired onto motherboard, hence making it tamper resistant from remote attack. To interface with the TPM chip, the TCG prescribe a standard interface to communicate with the TPM. However, there are some difficulties in interfacing an application to the TPM. Acquiring full knowledge of Trusted Computing is a critical success factor to successfully modify existing application including design, coding and testing the TPM based application. This paper presents a method that allows existing application running on a platform without a TPM to utilize the TPM functionalities.
Keywords :
data privacy; coding; smart card; testing; trusted computing group; user privacy; user security; Computer architecture; Privacy; Protocols; Security; Servers; Software; Virtual private networks; TCG; TNC; TPM; attestation; trusted application; trusted compartment; trusted platform module; trusted wrapper;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Network Applications Protocols and Services (NETAPPS), 2010 Second International Conference on
Conference_Location :
Kedah
Print_ISBN :
978-1-4244-8048-7
Electronic_ISBN :
978-0-7695-4177-8
Type :
conf
DOI :
10.1109/NETAPPS.2010.35
Filename :
5635814
Link To Document :
بازگشت