Trusted computing and open source

  • Authors:
  • David Safford;Mimi Zohar

  • Affiliations:
  • T.J. Watson Research Center, IBM, P.O. Box 704, Yorktown Heights, NY 10598, USA;T.J. Watson Research Center, IBM, P.O. Box 704, Yorktown Heights, NY 10598, USA

  • Venue:
  • Information Security Tech. Report
  • Year:
  • 2005

Quantified Score

Hi-index 0.00

Visualization

Abstract

Trusted computing can help defend Linux and other open source operating systems and applications from attack. It can help protect desktop and mobile Linux clients from on-line and off-line integrity and confidentiality attacks. It can measure and remotely attest to the integrity of a system. It can provide authentication mechanisms which are resistant to phishing and pharming attacks. This paper describes the features of Trusted Computing's Trusted Platform Module (TPM), shows how the TPM can provide these protections, and summarizes work in the open source community to implement them.