Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1109/NETAPPS.2010.35guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

An Approach to Establish Trusted Application

Published: 22 September 2010 Publication History

Abstract

Trusted Computing offer great opportunities to enhance security and privacy of the user. Trusted Platform Module (TPM) is the implementation of the trusted platform initiatives on a chip under Trusted Computing Group (TCG). The TPM chip that is similar to smart card but hardwired onto motherboard, hence making it tamper resistant from remote attack. To interface with the TPM chip, the TCG prescribe a standard interface to communicate with the TPM. However, there are some difficulties in interfacing an application to the TPM. Acquiring full knowledge of Trusted Computing is a critical success factor to successfully modify existing application including design, coding and testing the TPM based application. This paper presents a method that allows existing application running on a platform without a TPM to utilize the TPM functionalities.

Recommendations

Comments

Information & Contributors

Information

Published In

cover image Guide Proceedings
NETAPPS '10: Proceedings of the 2010 Second International Conference on Network Applications, Protocols and Services
September 2010
252 pages
ISBN:9780769541778

Publisher

IEEE Computer Society

United States

Publication History

Published: 22 September 2010

Author Tags

  1. TCG
  2. TNC
  3. TPM
  4. attestation
  5. trusted application
  6. trusted compartment
  7. trusted platform module
  8. trusted wrapper

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • 0
    Total Citations
  • 0
    Total Downloads
  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 20 Jan 2025

Other Metrics

Citations

View Options

View options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media