New directions for hardware-assisted trusted computing policies (Position Paper)

3Citations
Citations of this article
7Readers
Mendeley users who have this article in their library.
Get full text

Abstract

The basic technological building blocks of the TCG architecture seem to be stabilizing. As a result, we believe that the focus of the Trusted Computing (TC) discipline must naturally shift from the design and implementation of the hardware root of trust (and the subsequent trust chain) to the higher-level application policies. Such policies must build on these primitives to express new sets of security goals. We highlight the relationship between enforcing these types of policies and debugging, since both activities establish the link between expected and actual application behavior. We argue that this new class of policies better fits developers' mental models of expected application behaviors, and we suggest a hardware design direction for enabling the efficient interpretation of such policies. © 2009 Vieweg+Teubner Verlag | GWV Fachverlage GmbH, Wiesbaden.

Cite

CITATION STYLE

APA

Bratus, S., Locasto, M. E., Ramaswamy, A., & Smith, S. W. (2009). New directions for hardware-assisted trusted computing policies (Position Paper). In Future of Trust in Computing: Proceedings of the First International Conference Future of Trust in Computing 2008: With 58 Illustrations (pp. 30–37). Vieweg+Teubner. https://doi.org/10.1007/978-3-8348-9324-6_3

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free