Trusted computing and provenance: better together

  • Authors:
  • John Lyle;Andrew Martin

  • Affiliations:
  • Oxford University Computing Laboratory;Oxford University Computing Laboratory

  • Venue:
  • TAPP'10 Proceedings of the 2nd conference on Theory and practice of provenance
  • Year:
  • 2010

Quantified Score

Hi-index 0.00

Visualization

Abstract

It is widely realised that provenance systems can benefit from greater awareness of security principles and the use of security technology. In this paper, we argue that Trusted Computing, a hardware-based method for establishing platform integrity, is not only useful, but immediately applicable. We demonstrate how existing Trusted Computing mechanisms can be used for provenance, and identify the remarkable similarity and overlap between the two research areas. This is accomplished through presenting architectural ideas for a trusted provenance system, and by comparing the respective requirements and capabilities of trusted systems and provenance systems.