An approach to containing computer viruses
Computers and Security
Linux Journal
LOMAC: Low Water-Mark Integrity Protection for COTS Environments
SP '00 Proceedings of the 2000 IEEE Symposium on Security and Privacy
The Caernarvon secure embedded operating system
ACM SIGOPS Operating Systems Review
Hi-index | 0.00 |
Trusted computing can help defend Linux and other open source operating systems and applications from attack. It can help protect desktop and mobile Linux clients from on-line and off-line integrity and confidentiality attacks. It can measure and remotely attest to the integrity of a system. It can provide authentication mechanisms which are resistant to phishing and pharming attacks. This paper describes the features of Trusted Computing's Trusted Platform Module (TPM), shows how the TPM can provide these protections, and summarizes work in the open source community to implement them.