• DocumentCode
    472500
  • Title

    An Approach for Compliance Validation of Trusted Computing Applications

  • Author

    Cui, Qi ; Shi, Wenchang

  • Author_Institution
    Chinese Acad. of Sci., Beijing
  • fYear
    2008
  • fDate
    23-24 Jan. 2008
  • Firstpage
    574
  • Lastpage
    579
  • Abstract
    Trusted computing (TC) is considered to be one of the newly developed technologies on improving computer security and creating a trustworthy environment. Although the Trusted Computing Group (TCG) has defined specifications/or TC, including that of trusted platform module (TPM), criteria on compliance testing is still not available. It is important that the design and implementation of TPM and other components follow the specifications, as incompliance may lead to crucial security impacts. In this paper, a test mechanism checking TPM commands is instrumented into TPM application, so that conformance to standards can be examined before TPM\´s functional execution to validate its compliance with the specifications. Furthermore, this paper also initially puts forward the concept of "chain of compliance", which enhances the trustworthiness of computing platforms by verifying the conformance of their components.
  • Keywords
    data privacy; security of data; chain of compliance; compliance testing; compliance validation; computer security; trusted computing; trusted platform module; trustworthy environment; Application software; Automata; Computer applications; Data mining; Instruments; Performance evaluation; Protocols; Security; Software testing; System testing;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Knowledge Discovery and Data Mining, 2008. WKDD 2008. First International Workshop on
  • Conference_Location
    Adelaide, SA
  • Print_ISBN
    978-0-7695-3090-1
  • Type

    conf

  • DOI
    10.1109/WKDD.2008.25
  • Filename
    4470463