DocumentCode
2081071
Title
Privacy and trusted computing
Author
Reid, Jason ; Nieto, Juan M González ; Dawson, Ed ; Okamoto, Eiji
Author_Institution
Inf. Security Res. Centre, Queensland Univ. of Technol., Australia
fYear
2003
fDate
1-5 Sept. 2003
Firstpage
383
Lastpage
388
Abstract
This paper examines a model of trusted computing wherein a computing platform is able to make assertions about its current software configuration that may be trusted by the user and remote third parties. The privacy implications of this approach are investigated in the context of the Trusted Computing Platform Alliance (TCPA) specification. The trust relationships of the TCPA architecture are examined in detail. An analysis of the revocation requirements inherent in the TCPA design is presented, which highlights the challenges that revocation presents in the context of a large scale deployment of TCPA platforms. Finally, a modification to the specification is suggested that reduces the level of trust that need to be placed on the Privacy CA.
Keywords
cryptography; data privacy; formal specification; large-scale systems; telecommunication security; TCPA specification; Trusted Computing Platform Alliance; computing platform; privacy management; revocation requirements; software configuration; trusted computing; Acceleration; Application software; Computer architecture; Computer network reliability; Computer networks; Information security; Large-scale systems; Operating systems; Personal communication networks; Privacy;
fLanguage
English
Publisher
ieee
Conference_Titel
Database and Expert Systems Applications, 2003. Proceedings. 14th International Workshop on
ISSN
1529-4188
Print_ISBN
0-7695-1993-8
Type
conf
DOI
10.1109/DEXA.2003.1232052
Filename
1232052
Link To Document