DocumentCode
472500
Title
An Approach for Compliance Validation of Trusted Computing Applications
Author
Cui, Qi ; Shi, Wenchang
Author_Institution
Chinese Acad. of Sci., Beijing
fYear
2008
fDate
23-24 Jan. 2008
Firstpage
574
Lastpage
579
Abstract
Trusted computing (TC) is considered to be one of the newly developed technologies on improving computer security and creating a trustworthy environment. Although the Trusted Computing Group (TCG) has defined specifications/or TC, including that of trusted platform module (TPM), criteria on compliance testing is still not available. It is important that the design and implementation of TPM and other components follow the specifications, as incompliance may lead to crucial security impacts. In this paper, a test mechanism checking TPM commands is instrumented into TPM application, so that conformance to standards can be examined before TPM\´s functional execution to validate its compliance with the specifications. Furthermore, this paper also initially puts forward the concept of "chain of compliance", which enhances the trustworthiness of computing platforms by verifying the conformance of their components.
Keywords
data privacy; security of data; chain of compliance; compliance testing; compliance validation; computer security; trusted computing; trusted platform module; trustworthy environment; Application software; Automata; Computer applications; Data mining; Instruments; Performance evaluation; Protocols; Security; Software testing; System testing;
fLanguage
English
Publisher
ieee
Conference_Titel
Knowledge Discovery and Data Mining, 2008. WKDD 2008. First International Workshop on
Conference_Location
Adelaide, SA
Print_ISBN
978-0-7695-3090-1
Type
conf
DOI
10.1109/WKDD.2008.25
Filename
4470463
Link To Document