Trusted Computing and Linux

  • Hall K
  • Lendacky T
  • Ratliff E
  • et al.
N/ACitations
Citations of this article
9Readers
Mendeley users who have this article in their library.

Abstract

While Trusted Computing and Linux R seem antithetical on the surface, Linux users can benefit from the security features, including system integrity and key confidentiality, pro- vided by Trusted Computing. The purpose of this paper is to discuss the work that has been done to enable Linux users to make use of their Trusted Platform Module (TPM) in a non-evil manner. The paper describes the individual software components that are required to en- able the use of the TPM, including the TPM device driver and TrouSerS, the Trusted Soft- ware Stack, and TPM management. Key con- cerns with Trusted Computing are highlighted along with what the Trusted Computing Group has done and what individual TPM owners can do to mitigate these concerns. Example ben- eficial uses for individuals and enterprises are discussed including eCryptfs and GnuPG usage of the TPM. There is a tremendous opportunity for enhanced security through enabling projects to use the TPM so there is a discussion on the most promising avenues.

Cite

CITATION STYLE

APA

Hall, K., Lendacky, T., Ratliff, E., & Yoder, K. (2005). Trusted Computing and Linux. Linux Symposium.

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free