• DocumentCode
    2081071
  • Title

    Privacy and trusted computing

  • Author

    Reid, Jason ; Nieto, Juan M González ; Dawson, Ed ; Okamoto, Eiji

  • Author_Institution
    Inf. Security Res. Centre, Queensland Univ. of Technol., Australia
  • fYear
    2003
  • fDate
    1-5 Sept. 2003
  • Firstpage
    383
  • Lastpage
    388
  • Abstract
    This paper examines a model of trusted computing wherein a computing platform is able to make assertions about its current software configuration that may be trusted by the user and remote third parties. The privacy implications of this approach are investigated in the context of the Trusted Computing Platform Alliance (TCPA) specification. The trust relationships of the TCPA architecture are examined in detail. An analysis of the revocation requirements inherent in the TCPA design is presented, which highlights the challenges that revocation presents in the context of a large scale deployment of TCPA platforms. Finally, a modification to the specification is suggested that reduces the level of trust that need to be placed on the Privacy CA.
  • Keywords
    cryptography; data privacy; formal specification; large-scale systems; telecommunication security; TCPA specification; Trusted Computing Platform Alliance; computing platform; privacy management; revocation requirements; software configuration; trusted computing; Acceleration; Application software; Computer architecture; Computer network reliability; Computer networks; Information security; Large-scale systems; Operating systems; Personal communication networks; Privacy;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Database and Expert Systems Applications, 2003. Proceedings. 14th International Workshop on
  • ISSN
    1529-4188
  • Print_ISBN
    0-7695-1993-8
  • Type

    conf

  • DOI
    10.1109/DEXA.2003.1232052
  • Filename
    1232052