As an important capability of trusted computing platform, sealing can provide strong data storage security by combining data's encryption with the platform configuration, by which data can only be unsealed under specific configurations. However, sealing operation is hard to use for the complexity of modern OS, the randomness of the loading order of the booting components, the frequently changing configuration, software update and patches. IMA (integrity measurement architecture) implemented in operating system could measure the dynamic configurations and extend them to the trust chain of the whole trusted platform, and then support the data sealing. Therefore, a new approach to data sealing based on IMA is proposed here, which seals da...
Data Integrity Auditing (DIA) is a security service for verifying the integrity of outsourced data i...
Various security mechanisms are available to validate, authenticate and permit codes, data and scrip...
Trusted Platform Module (TPM) is a security token embedded in every business laptop and computers. I...
Trusted computing aims to build a trusted computing environment for information systems with the hel...
Abstract: Trust is an indispensable part of the computing environment, the validity of any transacti...
Trusted Computing capability has become ubiquitous these days, and it is being widely deployed into ...
Storing information such as data backups or family pictures on third party servers instead of local ...
Fault-tolerant computer systems are increasingly being used in such applications as e-commerce, bank...
Checking the integrity of an application is necessary to determine if the latter will behave as expe...
Security controls (such as encryption endpoints, payment gateways, and firewalls) rely on correct pr...
Abstract—We define secure operations with tree-formed, pro-tected verification data registers. Funct...
A protection model is presented for a multi-user dataflow computing system which is incorporated int...
The amount of data generated by scientific and commercial applications is growing at an ever-increas...
This thesis deals with the analysis and design of trusted computing platforms. Trusted computing tec...
In this paper we describe bugs and ways to attack trusted computing systems based on a static root o...
Data Integrity Auditing (DIA) is a security service for verifying the integrity of outsourced data i...
Various security mechanisms are available to validate, authenticate and permit codes, data and scrip...
Trusted Platform Module (TPM) is a security token embedded in every business laptop and computers. I...
Trusted computing aims to build a trusted computing environment for information systems with the hel...
Abstract: Trust is an indispensable part of the computing environment, the validity of any transacti...
Trusted Computing capability has become ubiquitous these days, and it is being widely deployed into ...
Storing information such as data backups or family pictures on third party servers instead of local ...
Fault-tolerant computer systems are increasingly being used in such applications as e-commerce, bank...
Checking the integrity of an application is necessary to determine if the latter will behave as expe...
Security controls (such as encryption endpoints, payment gateways, and firewalls) rely on correct pr...
Abstract—We define secure operations with tree-formed, pro-tected verification data registers. Funct...
A protection model is presented for a multi-user dataflow computing system which is incorporated int...
The amount of data generated by scientific and commercial applications is growing at an ever-increas...
This thesis deals with the analysis and design of trusted computing platforms. Trusted computing tec...
In this paper we describe bugs and ways to attack trusted computing systems based on a static root o...
Data Integrity Auditing (DIA) is a security service for verifying the integrity of outsourced data i...
Various security mechanisms are available to validate, authenticate and permit codes, data and scrip...
Trusted Platform Module (TPM) is a security token embedded in every business laptop and computers. I...