Issue No.02 - March/April (2005 vol.3)
Alexander Iliev , Dartmouth College
DOI Bookmark: http://doi.ieeecomputersociety.org/10.1109/MSP.2005.49
Current trusted-computing initiatives usually involve large organizations putting physically secure hardware on user machines, potentially violating user privacy. Yet, it's possible to exploit robust server-side secure hardware to enhance user privacy. Two case studies demonstrate using secure coprocessors at the server.
Secure coprocessor, Private Information Retrieval, Oblivious RAM, prototype, PKI, network traffic archival
Alexander Iliev, "Protecting Client Privacy with Trusted Computing at the Server", IEEE Security & Privacy, vol.3, no. 2, pp. 20-28, March/April 2005, doi:10.1109/MSP.2005.49