Title :
An Approach for Compliance Validation of Trusted Computing Applications
Author :
Cui, Qi ; Shi, Wenchang
Author_Institution :
Chinese Acad. of Sci., Beijing
Abstract :
Trusted computing (TC) is considered to be one of the newly developed technologies on improving computer security and creating a trustworthy environment. Although the Trusted Computing Group (TCG) has defined specifications/or TC, including that of trusted platform module (TPM), criteria on compliance testing is still not available. It is important that the design and implementation of TPM and other components follow the specifications, as incompliance may lead to crucial security impacts. In this paper, a test mechanism checking TPM commands is instrumented into TPM application, so that conformance to standards can be examined before TPM\´s functional execution to validate its compliance with the specifications. Furthermore, this paper also initially puts forward the concept of "chain of compliance", which enhances the trustworthiness of computing platforms by verifying the conformance of their components.
Keywords :
data privacy; security of data; chain of compliance; compliance testing; compliance validation; computer security; trusted computing; trusted platform module; trustworthy environment; Application software; Automata; Computer applications; Data mining; Instruments; Performance evaluation; Protocols; Security; Software testing; System testing;
Conference_Titel :
Knowledge Discovery and Data Mining, 2008. WKDD 2008. First International Workshop on
Conference_Location :
Adelaide, SA
Print_ISBN :
978-0-7695-3090-1
DOI :
10.1109/WKDD.2008.25