Back to Search Start Over

Trends and Directions in Trusted Computing: Models, Architectures and Technologies.

Authors :
Amin, Muhammad
Khan, Shabaz
Ali, Tamleek
Gul, Saleem
Source :
International MultiConference of Engineers & Computer Scientists 2008; 2008, p280-285, 6p
Publication Year :
2008

Abstract

Until recently, all the security measures have addressed servers or networks while clients or network endpoints have missed the required security concerns relatively. Most of the mechanisms safeguarding endpoints (clients) are software based. Making endpoints survive in open and reasonably exposed environments-like internet-demand that client security should stand by a tried and true dependence and merely software based mechanisms are inadequate in providing the desired security level. Trusted Computing (TC) initiatives solve these security problems through operating environments, applications and secure hardware changes to the personal computer. Using secure hardware as a basis for trusted computing provides a level of relevance since hardware-based security is mooted difficult to compromise than conventional approaches. Therefore, TC provides a powerful set of features to implement applications such as secure auctions, integrity measurement, and biometric identification. In this paper, we present a detailed discussion of the different approaches towards a trusted computing platform; examine these approaches and provide a set of attack mechanisms enforced if trusted initiatives are not employed at user-level. The future directions along this line of research are also conferred. [ABSTRACT FROM AUTHOR]

Details

Language :
English
Database :
Supplemental Index
Journal :
International MultiConference of Engineers & Computer Scientists 2008
Publication Type :
Book
Accession number :
41020286