DocumentCode :
2085198
Title :
The TrustedFlow™ protocol - idiosyncratic signatures for authenticated execution
Author :
Baldi, Mario ; Ofek, Yoram ; Yung, Moti
Author_Institution :
Comput. Eng. Dept., Torino Polytech., Italy
fYear :
2003
fDate :
18-20 June 2003
Firstpage :
288
Lastpage :
289
Abstract :
We present a software solution to the problem of remotely authenticating software during execution, which aims at assuring that the software is not changed prior to and during execution. The solution is based on a flow of idiosyncratic signatures that is generated by a function hidden in the software to be authenticated and validated by a remote computing component. The TrustedFlow™ approach is complementary to many current enhancements for secure computing and networking: while other approaches provide privacy and authentication protecting from the attacks of a man in the middle, TrustedFlow™ protects from the attack of a man at the edge.
Keywords :
computer crime; cryptography; data privacy; message authentication; protocols; TrustedFlow protocol; idiosyncratic signature; network security; remote computing component; software authentication; software validation; trusted code execution; trusted computing; Application software; Authentication; Collaborative software; Computer network management; Computer networks; Network servers; Privacy; Protection; Protocols; Runtime;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Information Assurance Workshop, 2003. IEEE Systems, Man and Cybernetics Society
Print_ISBN :
0-7803-7808-3
Type :
conf
DOI :
10.1109/SMCSIA.2003.1232435
Filename :
1232435
Link To Document :
بازگشت