Implementing a Portable Trusted Environment

4Citations
Citations of this article
6Readers
Mendeley users who have this article in their library.
Get full text

Abstract

The development of trusted systems, as envisaged by the Trusted Computing Group, assumed that the computing environments are uniform in terms of their operational environment, including hardware configuration, execution of a standard set of applications, operating system and facilities and procedures that allow the issue, revocation and maintenance of critical encryption keys and authorization certificates. These assumptions may be applicable to a single managed enterprise infrastructure. However, in situations where the users are mobile, or the computing environment is heterogeneous and the Internet provides the connectivity, the management of trust between enterprises becomes overwhelmingly difficult, if not impossible. As a result, deployment and uptake of trusted secure systems based on Trusted Platform Module have not been as successful as first envisaged. In this paper, we report on our experiences in designing and implementing a prototype personal trusted device called the Trust Extension Device, or TED, that provides users with a portable trustworthy environment for conducting transactions on any Internet connected computer. © 2009 Vieweg+Teubner Verlag | GWV Fachverlage GmbH, Wiesbaden.

Cite

CITATION STYLE

APA

Zic, J., & Nepal, S. (2009). Implementing a Portable Trusted Environment. In Future of Trust in Computing: Proceedings of the First International Conference Future of Trust in Computing 2008: With 58 Illustrations (pp. 17–29). Vieweg+Teubner. https://doi.org/10.1007/978-3-8348-9324-6_2

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free