Trusted computing architectures for a mobile IT infrastructure

  • Authors:
  • Vijay Anand;Jafar Saniie;Erdal Oruklu

  • Affiliations:
  • Southeast Missouri State University and Illinois Institute of Technology, Cape Girardeau, MO, USA;Illinois Institute of Technology, Chicago, IL, USA;Illinois Institute of Technology, Chicago, IL, USA

  • Venue:
  • Proceedings of the 39th annual ACM SIGUCCS conference on User services
  • Year:
  • 2011

Quantified Score

Hi-index 0.00

Visualization

Abstract

As computing architectures become mobile the physical ownership of data and security guarantees for that data is required to gain trust of the users of the computing architectures. In this paper we highlight security guarantees required to alleviate privacy concerns of the users of a computing service. A hardware system entrusted with security is referred to as the trusted platform module (TPM). We highlight how security guarantees in an IT infrastructure can be met using trusted platform modules and should be an integral part of computing services along with other security constructs like firewalls, intrusion detection systems, anti-virus etc.