An approach to a trustworthy system architecture using visualization

30Citations
Citations of this article
21Readers
Mendeley users who have this article in their library.
Get full text

Abstract

We present a system architecture for trusted transactions in highly sensitive environments. This architecture takes advantage of techniques provided by the Trusted Computing Group (TCG) to attest the system state of the communication partners, to guarantee that the system is free of malware and that its software has not been tampered with. To achieve meaningful attestation, virtualization is used to establish several different execution environments. The attestation process is limited to a fragment of the software running on the platform, more specifically, to the part requesting access to sensitive data. The Trusted Platform Module (TPM) is virtualized, in order to make it accessible for an execution environment with a higher trust level. © Springer-Verlag Berlin Heidelberg 2007.

Cite

CITATION STYLE

APA

Stumpf, F., Benz, M., Hermanowski, M., & Eckert, C. (2007). An approach to a trustworthy system architecture using visualization. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 4610 LNCS, pp. 191–202). Springer Verlag. https://doi.org/10.1007/978-3-540-73547-2_21

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free