SOSP '95 Proceedings of the fifteenth ACM symposium on Operating systems principles
Architectural support for copy and tamper resistant software
ACM SIGPLAN Notices
AEGIS: architecture for tamper-evident and tamper-resistant processing
ICS '03 Proceedings of the 17th annual international conference on Supercomputing
A trusted mobile phone reference architecturevia secure kernel
Proceedings of the 2007 ACM workshop on Scalable trusted computing
Hi-index | 0.01 |
Service-oriented computing requires un-trusted and trusted software to simultaneously execute on the same hardware platform. Trusted software protects a service provider's business model and must execute in a high assurance environment. Increasingly, hardware mechanisms are required to create high-assurance closed environments to host trusted software on open platforms. In current approaches, independent hardware vendors (IHVs) design and implement closed environments with proprietary interfaces specific to mobile phones, PCs and servers, forcing independent software vendors (ISVs) and service providers to develop non-portable software. In this paper, we present an abstract closed environment architecture that exposes its facilities via implementation-independent canonical interfaces. IHVs can use this architecture to implement platform-specific closed environments, while ISVs and service providers develop applications to the canonical interface and build portable trusted software. We discuss example implementations of our framework to demonstrate the feasibility of building scalable solutions to support trustworthy service-oriented computing.