Operating System based Compliance Validation of  Trusted Computing

Abstract

The concept of trusted computing given was by Anderson [2]. Trust is an expectation that a device behaves in a particular manner. A trusted  component, operation or process is one whose behavior is predictable under almost any operating condition which is highly resistant to viruses or any physical interference. Trusted computing is one of the key technologies in the field of information security. It is the security solution proposed by TCG [1]. Its core concept is “chain of transitive trust”, which means measurements  and authentications are performed level by level based on Roots of Trust to assure the  booting process, operating system and  applications of a computing platform have executed correctly within users’ expectations. The main idea of trusted computing is to equip computer systems with a device that can be trusted by all. The Trusted Computing Group (TCG) has addressed a new generation of computing platforms employing both supplemental hardware and software with the primary goal to improve the security and the trustworthiness of present and future IT systems. The Trusted computing platform proposes to address the problem of remote trust. The Trusted Computing Platform (TCP) implies some party trusts the platform which is under consideration. The core component of the TCG proposal is the Trusted Platform Module (TPM) [1] providing certain cryptographic functions. Many vendors have already started to equip their platforms with a TPM claiming to be TCG compliant. However, there is no feasible way for application developers and users of TPM-enabled systems to verify the compliance. Compliance test is performed to assess whether a system considered, functions perfectly according to the given specifications. Testing can be very expensive if performed by brute force. Hence, one of the basic approaches for compliance testing is performed by constructing a Finite State Automata which can perform test in an inexpensive manner.  

Authors and Affiliations

Madan Singh , Surekha Chauhan

Keywords

Related Articles

A WEB BASED TOMATO CROP EXPERT INFORMATION SYSTEM BASED ON ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING ALGORITHM

 Tomato is now the most widely grown vegetable crop in World. It is grown throughout the world in farm gardens, small home-gardens, and by market gardeners for fresh consumption as well as for pr...

An overview of interval encoded temporal mining involving prioritized mining, fuzzy mining, and positive and negative rule mining

 Databases and data warehouses have become a vital part of many organizations. So useful information and helpful knowledge have to be mined from transactions. In real life, media information has time attributes eith...

Analysis of Data and Traffic Management during Privacy Preservation in Secure Multiparty Computation

-A protocol is secure if th e parties who want to compute their inputs hands it to the trusted parties. Trusted parties in turn compute th e inputs using the function f and give the re sult t o the respec tive parties...

Anti-Phishing Design Using Mutual Authentication Approach

The act of sending an e-mail to a client fallaciously declares to be a recognized genuine organization in an endeavour to deceive the client into compromise confidential information that will be used for identity theft....

An approach of Requirements Tracing by using a multilevel Framework

This paper presents a multilevel framework for tracing the requirements. Before presenting the framework, a review in systematic fashion was conducted and based on the results of that we tried to find out the gaps betwee...

Download PDF file
  • EP ID EP113452
  • DOI -
  • Views 97
  • Downloads 0

How To Cite

Madan Singh, Surekha Chauhan (2010). Operating System based Compliance Validation of  Trusted Computing. International Journal of Computer Science and Information Technologies, 1(5), 363-365. https://europub.co.uk/articles/-A-113452