The Community for Technology Leaders
RSS Icon
Subscribe
Issue No.02 - March/April (2011 vol.28)
pp: 35-41
Giovanni Cabiddu , Politecnico di Torino
Emanuele Cesena , Politecnico di Torino
Roberto Sassu , Politecnico di Torino
Davide Vernizzi , Politecnico di Torino
Gianluca Ramunno , Politecnico di Torino
Antonio Lioy , Politecnico di Torino
ABSTRACT
The Trusted Platform Agent (TPA) is designed to minimize the effort of writing applications that use Trusted Computing (TC) technology and employ the Trusted Platform Module (TPM). Writing applications for TC requires a TCG software stack (TSS), but there are still a number of tedious and repetitive operations to be carried out. One way to reduce these is by linking an application with the TPA library to avoid the complexity of the TSS interface. This also simplifies tasks in which TC primitives need to be integrated with other commonly needed functions, such as cryptographic or network-related functions.
INDEX TERMS
protection mechanisms, reusable libraries, Trusted Computing, Trusted Platform Agent, software, security and privacy
CITATION
Giovanni Cabiddu, Emanuele Cesena, Roberto Sassu, Davide Vernizzi, Gianluca Ramunno, Antonio Lioy, "The Trusted Platform Agent", IEEE Software, vol.28, no. 2, pp. 35-41, March/April 2011, doi:10.1109/MS.2010.160
REFERENCES
1. TPM Main Specification, v. 1.2, revision 103, Trusted Computing Group, July 2007; www.trustedcomputinggroup.org/resourcestpm_main_specification .
2. TCG Software Stack (TSS) Specification, v. 1.2, Trusted Computing Group, Mar. 2007; www.trustedcomputinggroup.org/files/resource_files/ 6479CD77-1D09-3519-AD89EAD1BC8C97F0 TSS_1_2_Errata_A-final.pdf.
3. C. Mitchell ed., Trusted Computing, 2nd ed., The Institution of Engineering and Technology, 2008.
4. D. Challener et al., A Practical Guide to Trusted Computing, IBM Press, 2008.
5. B. Parno, J.M. McCune, and A. Perrig, "Bootstrapping Trust in Commodity Computers," Proc. IEEE Symp. Security and Privacy, IEEE Press, 2010, pp. 414–429.
6. C. Stüble and A. Zaerin, "μTSS—A Simplified Trusted Software Stack," Proc. 3rd Int'l Conf. Trust and Trustworthy Computing, LNCS 6101, Springer, 2010, pp. 124–140.
7. R. Toegl et al., "Towards Platform-Independent Trusted Computing," Proc. 2009 ACM Workshop Scalable Trusted Computing (STC 09), ACM Press, 2009, pp. 61–66.
8. M. Strasser and H. Stamer, "A Software-Based Trusted Platform Module Emulator," Proc. 1st Int'l Conf. Trust and Trustworthy Computing, LNCS 4968, Springer, 2008, pp. 33–47.
9. K. Goldman, R. Perez, and R. Sailer, "Linking Remote Attestation to Secure Tunnel Endpoints," Proc. 1st ACM Workshop Scalable Trusted Computing (STC 06), ACM Press, 2006, pp. 21–24.
10. B. Kauer, "OSLO: Improving the Security of Trusted Computing," Proc. 16th Usenix Security Symp., Usenix Assoc., 2007, pp. 1–9.
11. R. Sailer et al., "Design and Implementation of a TCG-Based Integrity Measurement Architecture," Proc. 13th Usenix Security Symp., Usenix Assoc., 2004, pp. 223–238.
24 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool