Operating System based Compliance Validation of Trusted Computing
Journal Title: International Journal of Computer Science and Information Technologies - Year 2010, Vol 1, Issue 5
Abstract
The concept of trusted computing given was by Anderson [2]. Trust is an expectation that a device behaves in a particular manner. A trusted component, operation or process is one whose behavior is predictable under almost any operating condition which is highly resistant to viruses or any physical interference. Trusted computing is one of the key technologies in the field of information security. It is the security solution proposed by TCG [1]. Its core concept is “chain of transitive trust”, which means measurements and authentications are performed level by level based on Roots of Trust to assure the booting process, operating system and applications of a computing platform have executed correctly within users’ expectations. The main idea of trusted computing is to equip computer systems with a device that can be trusted by all. The Trusted Computing Group (TCG) has addressed a new generation of computing platforms employing both supplemental hardware and software with the primary goal to improve the security and the trustworthiness of present and future IT systems. The Trusted computing platform proposes to address the problem of remote trust. The Trusted Computing Platform (TCP) implies some party trusts the platform which is under consideration. The core component of the TCG proposal is the Trusted Platform Module (TPM) [1] providing certain cryptographic functions. Many vendors have already started to equip their platforms with a TPM claiming to be TCG compliant. However, there is no feasible way for application developers and users of TPM-enabled systems to verify the compliance. Compliance test is performed to assess whether a system considered, functions perfectly according to the given specifications. Testing can be very expensive if performed by brute force. Hence, one of the basic approaches for compliance testing is performed by constructing a Finite State Automata which can perform test in an inexpensive manner.
Authors and Affiliations
Madan Singh , Surekha Chauhan
A New Fuzzy Gaussian Noise Removal Method for Gray-Scale Images
A New Fuzzy Filter that adopts Fuzzy Logic is proposed in this paper which removes Gaussian Noise from the Corrupted Gray scale Images which is also good for Impulsive and multiplicative Noise. This Method Consists of Tw...
Operating System based Compliance Validation of Trusted Computing
The concept of trusted computing given was by Anderson [2]. Trust is an expectation that a device behaves in a particular manner. A trusted component, operation or process is one whose behavior is pr...
Combined Text Watermarking
There is a vast amount of digital text data exchanged over the internet for the past few years. Such exchanges necessitate a very robust copyright protection mechanism. This paper presents a new idea on how one can effec...
Study of Security in Wireless Sensor Networks
Wireless Sensor Network (WSN) is an emerging technology that shows great assure for various futuristic applications both for public and military. Many researchers tried to develop further cost and energy e...
PERFORMANCE COMPARISION OF QOS STABILITY METHODS IN WIMAX NETWORKS
Recently IEEE 802.16 WiMAX has attracted a lot of attention in wireless networking research and applications. An attempt had been made to compare DropTail, RED, Proportional fairness and DRR protocol...