The Community for Technology Leaders
RSS Icon
Subscribe
Issue No.06 - November/December (2008 vol.6)
pp: 60-66
Eimear Gallery , Open Trusted Computing
Chris J. Mitchell , University of London
Kenneth G. Paterson , University of London
ABSTRACT
Whether being heralded as a means of securing sensitive user data or condemned as a method of usurping owner control, trusted computing is proving to be one of the most controversial security technologies in recent years. Rather than become embroiled in the debate over possible (mis)appropriations of trusted computing technologies, the authors highlight some of the technical obstacles that can hinder trusted computing's widespread adoption.
INDEX TERMS
trusted computing, PKI, usability, backward compatibility
CITATION
Eimear Gallery, Chris J. Mitchell, Kenneth G. Paterson, "Challenges for Trusted Computing", IEEE Security & Privacy, vol.6, no. 6, pp. 60-66, November/December 2008, doi:10.1109/MSP.2008.138
REFERENCES
1. P. Gutmann, "PKI: It's Not Dead, Just Resting," Computer, vol. 35, no. 8, 2002, pp. 41–49.
2. G. Price, PKI: An Insider's View (Extended Abstract), tech. report RHUL-MA-2005-8, Dept. of Mathematics, Royal Holloway, Univ. of London, 2005.
3. E. Sparks, A Security Assessment of Trusted Platform Modules, tech. report TR-2007-597, Dept. of Computer Science, Dartmouth College, 2007.
4. E. Brickell, J. Camenisch, and L. Chen, "Direct Anonymous Attestation," Proc. 11th ACM Conf. Computer and Comm. Security (CCS 04), ACM Press, 2004, pp. 132–145.
5. A.-R. Sadeghi and C. Stüble, "Property-Based Attestation for Computing Platforms: Caring about Properties, not Mechanisms," C.F. Hempelmann, ed., Proc. 2004 Workshop New Security Paradigms (NSPW 04), ACM Press, 2004, pp. 67–77.
6. J. McCune et al., "Turtles All The Way Down: Research Challenges in User-Based Attestation," Proc. 2nd Usenix Workshop Hot Topics in Security (Hot-Sec 2007), Usenix Assoc., 2007; http://usenix.org/events/hotsec07/tech/full_papers/ mccunemccune.pdf.
7. R.O. Sinnott, "Development of Usable Grid Services for the Biomedical Community," Usability in E-Science Workshop: Proc. Int'l Workshop Interrogating Usability Issues in New Scientific Practice, Within the Lab and Within Society (NeSC 06), 2006, pp. 26–27.
8. A. Whitten and J.D. Tygar, "Why Johnny Can't Encrypt: A Usability Evaluation of PGP 5.0," Proc. 8th Conf. Usenix Security Symp. (Usenix 99), Usenix Assoc., 1999, pp. 169–183.
9. A.-R. Sadeghi et al., "TCG Inside? A Note on TPM Specification Compliance," Proc. 1st ACM Workshop Scalable Trusted Computing (STC 06), ACM Press, 2006, pp. 47–56.
2 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool