Filters








40,520 Hits in 5.4 sec

A Secure and Practical Approach for Providing Anonymity Protection for Trusted Platforms [chapter]

Kurt Dietrich, Johannes Winter
2010 Lecture Notes in Computer Science  
In order to overcome these problems, we present an anonymity preserving approach that allows trusted platforms to protect their anonymity without involvement of a trusted third party.  ...  Two different anonymisation schemes for Trusted Computing platforms have been proposed by the Trusted Computing Groupthe PrivacyCA scheme and the Direct Anonymous Attestation scheme.  ...  We thank the anonymous reviewers for their helpful comments. This work has been supported in part by the European Commission through the FP7 programme under contract 257433 SEPIA.  ... 
doi:10.1007/978-3-642-17650-0_22 fatcat:mkcjr276tnfgtkorgqoqfym7na

PE-TLBS: Secure Location Based Services Environment with Emphasis on Direct Anonymous Attestation Protocol

Hanunah Othman, Habibah Hashim, Jamalul-lail Ab Manan
2011 International Journal of Multimedia and Image Processing  
The framework implements a simplified protocol based on Direct Anonymous Attestation (DAA) scheme supported by Trusted Platform Module (TPM) functionalities.  ...  Nowadays, an IT officer would normally use virtualization as a security mechanism to provide clandestine isolation environment and concurrently hope with optimism to secure the emerging of cloud computing  ...  TCG standardizes a hardware-based security module as a security function for trust computing; known as TPM (Trusted Platform Module) for general PC (Personal Computer) environments and MTM (Mobile Trusted  ... 
doi:10.20533/ijmip.2042.4647.2011.0006 fatcat:k2cu7xvyafgsnm3vqd2dqvmmki

Time to Rethink: Trust Brokerage Using Trusted Execution Environments [chapter]

Patrick Koeberl, Vinay Phegade, Anand Rajan, Thomas Schneider, Steffen Schulz, Maria Zhdanova
2015 Lecture Notes in Computer Science  
As the assurance and availability of hardware-based Trusted Execution Environments (TEEs) is increasing, we propose an alternative direction of using TEEs as "neutral" environments for efficient yet secure  ...  Mining and analysis of digital data has the potential to provide improved quality of life and offer even life-saving insights.  ...  This helps reasoning about provided assurances and can be a basis for determining and negotiating abstract security policies.  ... 
doi:10.1007/978-3-319-22846-4_11 fatcat:ixdllo7h7zc6zb3fygbzyba24u

PESAP: A Privacy Enhanced Social Application Platform

Tom Reynaert, Willem De Groef, Dominique Devriese, Lieven Desmet, Frank Piessens
2012 2012 International Conference on Privacy, Security, Risk and Trust and 2012 International Confernece on Social Computing  
The framework is based on two pillars: anonymization of the social graph and secure information flow inside the browser.  ...  In this paper we present a framework for a privacy enhanced social application platform, called PESAP, that technically enforces the protection of the personal information of a user, when interacting with  ...  This publication reflects the views only of the author, and the European Commission cannot be held responsible for any use which may be made of the information contained therein.  ... 
doi:10.1109/socialcom-passat.2012.39 dblp:conf/socialcom/ReynaertGDDP12 fatcat:xnbb2nshvfbuhmhgmjrwmee46q

Cloud Computing: Data Storage Security Analysis and its Challenges

Navdeep Aggarwal, Parshant Tyagi, Bhanu P. Dubey, Emmanuel S. Pilli
2013 International Journal of Computer Applications  
Data security becomes an important issue for securing outsourced data and to maintain a level of trust among data owners.  ...  In this paper we will analyze the security requirements and the various approaches for data security. We also highlight the new emerging research challenges in data security and privacy.  ...  [11] presents a practical architecture to protect data confidentiality for guest virtual machines by constructing virtualization platform.  ... 
doi:10.5120/12216-8359 fatcat:msrianrnlbdx7cv267evtnqcce

Property-based attestation for computing platforms

Ahmad-Reza Sadeghi, Christian Stüble
2005 Proceedings of the 2004 workshop on New security paradigms - NSPW '04  
To overcome these problems generally, we propose a completely new approach: the attestation of a platform should not depend on the specific software or/and hardware (configuration) as it is today's practice  ...  The most notable effort is the Trusted Computing Group (TCG) and the Next-Generation Secure Computing Base (NGSCB).  ...  For instance, end-users could define a privacy-protecting Common Criteria [9] protection profile, while content providers define a content-protecting profile.  ... 
doi:10.1145/1065907.1066038 dblp:conf/nspw/SadeghiS04 fatcat:wtznwoggk5fcpgkasqrbbtw3d4

Trusted Computing: Security and Applications

Eimear Gallery, Chris J. Mitchell
2009 Cryptologia  
Following a brief introduction to the history of trusted computing, we provide a summary of its main features.  ...  The main objective of this paper is to highlight some of the major security and application issues confronting trusted computing technology.  ...  We would like to thank Stéphane Lo Presti and other partners in the OpenTC project for valuable guidance and advice over the last couple of years.  ... 
doi:10.1080/01611190802231140 fatcat:slr52mewqrbxtg6orjxes4valy

Identity Management and Control for Clouds [chapter]

Raghu Yeluri, Enrique Castro-Leon
2014 Building the Infrastructure for Cloud Security  
In this chapter, we will provide a broad introduction to identity, survey the challenges and requirements for identity management systems, and describe a set of technologies from Intel and McAfee that  ...  We looked at the concepts, solution architectures, and ISV components that establish and propagate platform trust, attestation, and boundary control, all of which are required to enable the trusted clouds  ...  A cloud-based approach to security that includes identity management ensures that the known trusted users can be distinguished from the unknown and less trusted.  ... 
doi:10.1007/978-1-4302-6146-9_7 fatcat:7rqnbfyfxbhrdkh2zgnfeupihy

Data Safe Havens and Trust: Toward a Common Understanding of Trusted Research Platforms for Governing Secure and Ethical Health Research

Nathan Christopher Lea, Jacqueline Nicholls, Christine Dobbs, Nayha Sethi, James Cunningham, John Ainsworth, Martin Heaven, Trevor Peacock, Anthony Peacock, Kerina Jones, Graeme Laurie, Dipak Kalra
2016 JMIR Medical Informatics  
The Farr Institute is a case study from which we propose a common definition of data safe havens as trusted platforms for clinical academic research.  ...  It has led to the development of a framework to support the secure handling of health care information used for clinical research that balances compliance with legal and regulatory controls and ethical  ...  Cataloguing and Data Management Robust anonymization is provided by a trusted third party, NWIS.  ... 
doi:10.2196/medinform.5571 pmid:27329087 pmcid:PMC4933798 fatcat:hsxyaqyr6fds3csl6zcnupomtq

Base Platform Security Hardware Building Blocks [chapter]

Sunil Cheruvu, Anil Kumar, Ned Smith, David M. Wheeler
2019 Demystifying Internet of Things Security  
-DAL Intel Converged Security Engine in CSE/CSME is a dedicated engine for security and provides a HW root of trust for the platform.  ...  The TCG defines an architectural requirement for secure platform boot by defining a root-of-trust-for-measurement (RTM) where the platform must provide a secure platform reset and initial boot executive  ...  These solutions also enable a simplified TEE-based IP protection for ecosystem.  ... 
doi:10.1007/978-1-4842-2896-8_3 fatcat:3fwox565h5f6zaf6duxknlk7bq

The Integrated Holistic Security and Privacy Framework Deployed in CrowdHEALTH Project

Stefanos Malliaros, Christos Xenakis, George Moldovan, John Mantas, Andriana Magdalinou, Lydia Montandon
2019 Acta Informatica Medica  
Individuals and healthcare providers need to trust that the EHRs are protected and that the confidentiality of their personal information is not at stake.  ...  , user authorization, access control, data anonymization, trust management and reputation modelling.  ...  However, providers and individuals alike must trust that an individual's health information is private and secure (3) .  ... 
doi:10.5455/aim.2019.27.333-340 pmid:32210501 pmcid:PMC7085323 fatcat:qb74yno6qzhobldwcpdhhwdfxm

Macro-level Attention to Mobile Agent Security: Introducing the Mobile Agent Secure Hub Infrastructure Concept [chapter]

Michelangelo Giansiracusa, Selwyn Russell, Andrew Clark, Volker Roth
2004 Lecture Notes in Computer Science  
Our infrastructural approach is based on a Mobile Agent Secure Hub (MASH) which is capable of providing a large number of security services for agent users and their deployed Internet mobile agents.  ...  For instance, the MASH can gather statistics on the track record of agent platforms in providing safe and reliable execution of agents.  ...  The first set of approaches (trusted hardware) suffer from limitations in their practicability to widespread mobile agent platform adoption.  ... 
doi:10.1007/978-3-540-30191-2_27 fatcat:w4xb5lvo7jbrbat2s3h7coprni

Covert Identity Information in Direct Anonymous Attestation (DAA) [chapter]

Carsten Rudolph
2007 IFIP International Federation for Information Processing  
Direct anonymous attestation (DAA) is a practical and efficient protocol for authenticated attestation with satisfaction of strong privacy requirements.  ...  This recently developed protocol is already adopted by the Trusted Computing Group and included in the standardized trusted platform module TPM.  ...  By using DAA a prover can remain anonymous (or pseudonymous), and nevertheless, provide evidence by which is attested that it is using certified trusted hardware (e.g. a TPM protected platform) and pseudonymous  ... 
doi:10.1007/978-0-387-72367-9_38 fatcat:skpjctipzbfl7orr2hj7ilmatq

Anonymity services for multi-agent systems

Martijn Warnier, Frances Brazier
2010 Web Intelligence and Agent Systems  
This paper proposes and analyzes a new approach for anonymous communication of agents based on the use of handles as pseudonyms.  ...  The paper furthermore introduces new approaches that provide authentication and anonymous payment schemes for agents.  ...  We also thank the anonymous(!) reviewers for the valuable comments and suggestions to earlier drafts of this paper.  ... 
doi:10.3233/wia-2010-0188 fatcat:yfcnccqkbze5hbqdwdjezdnk7y

Decentralised Trust for the Digital Economy [article]

Geoffrey Goodell
2021 arXiv   pre-print
, for the explicit goal of supporting truly consensual trust relationships and empowering local communities and organisations.  ...  , policies, and protocols for humans and computers alike.  ...  Where would the lines be drawn, and would a layered approach offer a way to achieve the necessary security without undermining privacy in the routine cases? 5.  ... 
arXiv:2108.04960v1 fatcat:dibqyzxqm5gexgwjtvebw4l4gu
« Previous Showing results 1 — 15 out of 40,520 results