• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations
Advanced Search Include Citations

Trust Extension as a Mechanism for Secure Code Execution on Commodity Computers. (2010)

by B Parno
Add To MetaCart

Tools

Sorted by:
Results 1 - 2 of 2

Trust Extension for Commodity Computers

by Bryan Parno
"... ..."
Abstract - Add to MetaCart
Abstract not found
(Show Context)

Citation Context

...iderable effort, but in the end, the project failed, and the kernel was never deployed. This failure was due, in part, to the absence of support for Ethernet – a feature considered critical by the time the kernel was completed, but not anticipated when it was initially designed [12]. Rather than building secure systems from scratch, we argue that we can resolve the tension between security and features by extending the trust a user has in one device to enable her to securely use another commodity device or service, without sacrificing the performance and features expected of commodity systems [22]. Note that we concentrate on average users and commodity systems, rather than on advanced users, special-purpose computers, or highly constrained environments (such as those found within the military). At a high level, we support this premise by developing techniques to allow a user to employ a small, trusted, portable device to securely learn what code is executing on her local computer. Rather than entrusting her data to the mountain of buggy code likely running on her computer, we construct an on-demand secure execution environment which can perform security-sensitive tasks and handle priv...

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, MANUSCRIPT ID 1 ABTTP: A TTP-based Prototype for Protecting Confidentiality of Sensitive Data with Active Bundles

by Lotfi Ben Othmane, Leszek Lilien, Senior Member Ieee, Bharat Bhargava, Fellow Ieee, Mark Linderman, Senior Member Ieee, Rohit Ranchal, Raed M. Salih
"... Abstract — The main challenges in information sharing are limitations of mechanisms for protecting confidentiality of sensitive data. An owner of the data may not be able to enumerate all entities that are allowed to access his data. The common approach to solve this problem is to attach privacy pol ..."
Abstract - Add to MetaCart
Abstract — The main challenges in information sharing are limitations of mechanisms for protecting confidentiality of sensitive data. An owner of the data may not be able to enumerate all entities that are allowed to access his data. The common approach to solve this problem is to attach privacy policies to the data. This approach assumes that the recipient’s hosts enforce the policies attached to the data. A solution that relaxes this assumption is to use active bundles which are containers with a payload of sensitive data, metadata, and a virtual machine (VM) specific to the active bundle. This paper investigates the question: Can data protect their own confidentiality? To answer this question we developed the ABTTP prototype. We assume trustworthy execution of VMs included in active bundles by requiring that hosts excuting VMs are Trusted Platform Modules enabled. Our ABTTP implementation uses a mobile agent framework. The prototype protects privacy of sensitive data through: (i) assuring enforcement of privacy policy by using VMs, (ii) using host trustworthiness to activate protection mechanisms when data is tampered with, and (iii) recording all data-related activities by its VM. The prototype demonstrates the solution in a mobile agent environment. It proves that data can protect its own confidentiality.
(Show Context)

Citation Context

...ot accessible (only used in the TPM) [28]. A TPM enables building trustworthy computing relationships. For instance, it can be used to prevent tampering software through exploiting the chain of trust =-=[22]-=-. Montero et al. [13] propose a technique for enforcing confidentiality protection during dissemination of sensitive data (such as digital identities) using sticky policies. Sticky policies are polici...

Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University