In this paper we identify shortcomings of the TCG specification related to the availability of sealed data during software and hardware life cycles, i.e., software update or/and hardware migration. In our view these problems are major obstacles for large-scale use of trusted computing technologies, e.g., in e-commerce, as adopters are concerned that the use of this technology might render their data inaccessible. We propose both software and hardware solutions to resolve these problems. Our proposals could be easily integrated into the TCG specification and preserve the interests of involved parties with regard to security and availability as well as privacy. © International Association for Cryptologic Research 2005.
CITATION STYLE
Kühn, U., Kursawe, K., Lucks, S., Sadeghi, A. R., & Stühle, C. (2005). Secure data management in trusted computing. In Lecture Notes in Computer Science (Vol. 3659, pp. 324–338). Springer Verlag. https://doi.org/10.1007/11545262_24
Mendeley helps you to discover research relevant for your work.