Secure data management in trusted computing

29Citations
Citations of this article
54Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

In this paper we identify shortcomings of the TCG specification related to the availability of sealed data during software and hardware life cycles, i.e., software update or/and hardware migration. In our view these problems are major obstacles for large-scale use of trusted computing technologies, e.g., in e-commerce, as adopters are concerned that the use of this technology might render their data inaccessible. We propose both software and hardware solutions to resolve these problems. Our proposals could be easily integrated into the TCG specification and preserve the interests of involved parties with regard to security and availability as well as privacy. © International Association for Cryptologic Research 2005.

Cite

CITATION STYLE

APA

Kühn, U., Kursawe, K., Lucks, S., Sadeghi, A. R., & Stühle, C. (2005). Secure data management in trusted computing. In Lecture Notes in Computer Science (Vol. 3659, pp. 324–338). Springer Verlag. https://doi.org/10.1007/11545262_24

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free