Protection in operating systems
Communications of the ACM
Handbook of Applied Cryptography
Handbook of Applied Cryptography
Inside Microsoft Windows 2000
Cryptography and competition policy: issues with 'trusted computing'
Proceedings of the twenty-second annual symposium on Principles of distributed computing
Practical Domain and Type Enforcement for UNIX
SP '95 Proceedings of the 1995 IEEE Symposium on Security and Privacy
A secure and reliable bootstrap architecture
SP '97 Proceedings of the 1997 IEEE Symposium on Security and Privacy
Analysis of the Intel Pentium's ability to support a secure virtual machine monitor
SSYM'00 Proceedings of the 9th conference on USENIX Security Symposium - Volume 9
Design and implementation of a TCG-based integrity measurement architecture
SSYM'04 Proceedings of the 13th conference on USENIX Security Symposium - Volume 13
Towards an open, trusted digital rights management platform
Proceedings of the ACM workshop on Digital rights management
Persistent access control: a formal model for drm
Proceedings of the 2007 ACM workshop on Digital Rights Management
A cryptographic access control architecture secure against privileged attackers
Proceedings of the 2007 ACM workshop on Computer security architecture
Flexible and secure enterprise rights management based on trusted virtual domains
Proceedings of the 3rd ACM workshop on Scalable trusted computing
One Method to Evaluate the Safety of Train Control Center
CAR '09 Proceedings of the 2009 International Asia Conference on Informatics in Control, Automation and Robotics
Improvement on TCG attestation and its implication for DRM
ICCSA'07 Proceedings of the 2007 international conference on Computational science and its applications - Volume Part I
A TCM-enabled access control scheme
ICA3PP'11 Proceedings of the 11th international conference on Algorithms and architectures for parallel processing - Volume Part II
A privacy-friendly architecture for future cloud computing
International Journal of Grid and Utility Computing
Hi-index | 0.00 |
Robust technological enforcement of DRM licenses assumes that the prevention of direct access to the raw bit representation of decrypted digital content and the license enforcement mechanisms themselves is possible. This is difficult to achieve on an open computing platform such as a PC. Recent trusted computing initiatives namely, the Trusted Computing Group (TCG) specification, and Microsoft's Next Generation Secure Computing Base (NGSCB) aim in part to address this problem. The protection architecture and access control model of mainstream operating systems makes them inappropriate as a platform for a DRM content rendering client because decrypted content cannot be protected against a privileged process. If a DRM client is to be deployed on an open computing platform, the operating system should implement the reference monitor concept, which underpins the mandatory access control model. The TCG model of trusted computing has important limitations when combined with an operating system enforcing discretionary access control. We argue that the TCG services of sealed storage and remote attestation which are important in DRM applications, cannot operate in a secure and efficient manner on such an operating system.