Abstract
While Trusted Computing and Linux R seem antithetical on the surface, Linux users can benefit from the security features, including system integrity and key confidentiality, pro- vided by Trusted Computing. The purpose of this paper is to discuss the work that has been done to enable Linux users to make use of their Trusted Platform Module (TPM) in a non-evil manner. The paper describes the individual software components that are required to en- able the use of the TPM, including the TPM device driver and TrouSerS, the Trusted Soft- ware Stack, and TPM management. Key con- cerns with Trusted Computing are highlighted along with what the Trusted Computing Group has done and what individual TPM owners can do to mitigate these concerns. Example ben- eficial uses for individuals and enterprises are discussed including eCryptfs and GnuPG usage of the TPM. There is a tremendous opportunity for enhanced security through enabling projects to use the TPM so there is a discussion on the most promising avenues.
Cite
CITATION STYLE
Hall, K., Lendacky, T., Ratliff, E., & Yoder, K. (2005). Trusted Computing and Linux. Linux Symposium.
Register to see more suggestions
Mendeley helps you to discover research relevant for your work.