Linux Security Modules: General Security Support for the Linux Kernel
Proceedings of the 11th USENIX Security Symposium
SELinux: NSA's Open Source Security Enhanced Linux
SELinux: NSA's Open Source Security Enhanced Linux
Design and implementation of a TCG-based integrity measurement architecture
SSYM'04 Proceedings of the 13th conference on USENIX Security Symposium - Volume 13
Uclinux: a linux security module for trusted-computing-based usage controls enforcement
Proceedings of the 2007 ACM workshop on Scalable trusted computing
Evaluating the usability of usage controls in electronic collaboration
Proceedings of the 4th symposium on Usable privacy and security
Usage control enforcement - a survey
ARES'11 Proceedings of the IFIP WG 8.4/8.9 international cross domain conference on Availability, reliability and security for business, enterprise and health information systems
Hi-index | 0.00 |
Usage controls enable the provider of some information to limit how recipients may use it. Usage controls may be desirable in enterprise environments, e.g., for regulatory compliance or to protect intellectual property in collaborative endeavors. We contribute Web protocol, server, and browser modifications for hardening existing software-based usage controls (e.g., PDF's) with Trusted Platform Modules (TPMs). TPMs are low-cost secure coprocessors present in an increasing number of computers. We use the TPM to prevent untrusted software from opening usage-controlled files. We implemented the proposed solution on Linux by adding a Linux Security Module to the kernel and modifying Apache and Firefox. No modifications are necessary in applications used for authoring and displaying usage-controlled files (e.g., OpenOffice and xpdf). Experiments show that the proposed scheme has modest impact on client response time and server CPU utilization.