Veranstaltung/Towards Open Trusted Computing Platforms: Unterschied zwischen den Versionen
Keine Bearbeitungszusammenfassung |
Marcus (Diskussion | Beiträge) Keine Bearbeitungszusammenfassung |
||
(11 dazwischenliegende Versionen von 3 Benutzern werden nicht angezeigt) | |||
Zeile 1: | Zeile 1: | ||
== | {{Veranstaltung | ||
|title=Towards Open Trusted Computing Platforms | |||
|actor=Christian Stüble | |||
|email= | |||
|url= | |||
|begin=2005/12/08 07:00:00 PM | |||
|place=LABOR e.V., Rottstr. 31, 44793 Bochum | |||
|contact= | |||
|audience= | |||
|tags= | |||
|type=talk | |||
|abstract=In this talk, we argue that TC can increase the security of computing platforms by faithfully designing the operating system. | |||
|image= | |||
|partof= | |||
}} | |||
==Towards Open Trusted Computing Platforms== | |||
Experiences of the past have shown that common computing platforms | |||
lack security due to architectural problems and complexity. In this | |||
context, Trusted Computing (TC) is announced to be the basis for | |||
next-generation computing platforms, and claimed to improve users' | |||
security. However, people are concerned about those capabilities of | |||
TC that may allow content providers to gain too much power and | |||
control over the use of digital content and users' private information. | |||
In this talk, we argue that TC can increase the security of computing | |||
platforms by faithfully designing the operating system. Moreover, we discuss | |||
how interferences between digital rights management capabilities and end-user | |||
security can be prevented. Our results are based on the fact that even with | |||
TC platforms the operating system has enough control over the platform to | |||
prevent misuse by both content providers and end-users. | |||
We argue that such a trustworthy operating system that is secure in | |||
the sense of multilateral security can be developed without much | |||
effort by efficiently combining the ideas of security kernels and | |||
state of the art of operating system technology. We propose a new | |||
architecture for a trustworthy security platform that uses TC | |||
hardware features in conjunction with an open-source security kernel | |||
we have developed. Our security kernel provides | |||
backward-compatibility to the Linux operating system. The layered | |||
design and its lightweightness allows an easy migration to other | |||
hardware platforms like PDAs, mobile phones, and embedded systems. |
Aktuelle Version vom 27. November 2014, 01:21 Uhr
Towards Open Trusted Computing Platforms | |
---|---|
Akteur | Christian Stüble |
Akteur Email | |
Akteur URL | |
Beginn | 2005/12/08 07:00:00 PM |
Ende | |
Ort | LABOR e.V., Rottstr. 31, 44793 Bochum |
Verantwortlich | |
Publikum | |
Schlagworte | |
Art | talk |
Rahmenveranstaltung | |
Export | iCalendar-Datei |
Towards Open Trusted Computing Platforms[Bearbeiten | Quelltext bearbeiten]
Experiences of the past have shown that common computing platforms lack security due to architectural problems and complexity. In this context, Trusted Computing (TC) is announced to be the basis for next-generation computing platforms, and claimed to improve users' security. However, people are concerned about those capabilities of TC that may allow content providers to gain too much power and control over the use of digital content and users' private information.
In this talk, we argue that TC can increase the security of computing platforms by faithfully designing the operating system. Moreover, we discuss how interferences between digital rights management capabilities and end-user security can be prevented. Our results are based on the fact that even with TC platforms the operating system has enough control over the platform to prevent misuse by both content providers and end-users.
We argue that such a trustworthy operating system that is secure in the sense of multilateral security can be developed without much effort by efficiently combining the ideas of security kernels and state of the art of operating system technology. We propose a new architecture for a trustworthy security platform that uses TC hardware features in conjunction with an open-source security kernel we have developed. Our security kernel provides backward-compatibility to the Linux operating system. The layered design and its lightweightness allows an easy migration to other hardware platforms like PDAs, mobile phones, and embedded systems.