Sciweavers

Share
SACMAT
2005
ACM

Peer-to-peer access control architecture using trusted computing technology

10 years 4 months ago
Peer-to-peer access control architecture using trusted computing technology
It has been recognized for some time that software alone does not provide an adequate foundation for building a high-assurance trusted platform. The emergence of industry-standard trusted computing technologies promises a revolution in this respect by providing roots of trust upon which secure applications can be developed. These technologies offer a particularly attractive platform for security in peer-to-peer environments. In this paper we propose a trusted computing architecture to enforce access control policies in such appliOur architecture is based on an abstract layer of trusted hardware which can be constructed with emerging trusted computing technologies. A trusted reference monitor (TRM) is introduced beyond the trusted hardware. By monitoring and verifying the integrity and properties of running applications in a platform using the functions of trusted computing, the TRM can enforce various policies on behalf of object owners. We further extend this platform-based architect...
Ravi S. Sandhu, Xinwen Zhang
Added 26 Jun 2010
Updated 26 Jun 2010
Type Conference
Year 2005
Where SACMAT
Authors Ravi S. Sandhu, Xinwen Zhang
Comments (0)
books