会议专题

IMPROVEMENT UPON ARCHITECTURE OF TCG CREDENTIALS

The Trusted Computing Group (TCG) has developed specifications for computing platforms that create a foundation of trust for software processes, based on credentials. But according to research on those credentials, we found management of those credentials is too complicated to implement, and the complication leads to underlying insecurity. The paper proposes a new architecture for credentials, making use of the EK credential and platform identity credential to accomplish the trust mechanism. This is a significant improvement on the previously five credentials required which are now reduced to only three. The proposal provides evidence for superiority in security and availability.

Trusted computing Architecture of credentials Root of trust Transitive trust

XING ZHANG LU ZHU SHENG YU

Institute of Electronic Technology, Information Engineering University, Zhengzhou, China 450004 Trus Computer School, Wuhan University, Wuhan, China 430072

国际会议

2008 International Conference on Machine Learning and Cybernetics(2008机器学习与控制论国际会议)

昆明

英文

3673-3678

2008-07-12(万方平台首次上网日期,不代表论文的发表时间)