Abstract
Trusted Computing gives rise to a new supply of trusted third parties on which distributed systems can potentially rely. They are the secure system components (hardware and software) built into nodes with Trusted Computing capabilities. These trusted third parties may be used for supporting communications in distributed systems. In particular, a trusted third party can check and certify the data sent from a node A to a node B, so that B can have some confidence in the properties of the data despite A ’s possible incompetence or malice. We present and explore this application of Trusted Computing, both in general and in specific instantiations.
Chapter PDF
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
References
Anderson, R. (2003a). Cryptography and competition policy — issues with ‘Trusted Computing’. On the Web at http://www.ftp.cl.cam.ac.uk/ftp/users/rja14/tcpa.pdf.
Anderson, R. (2003b). ‘Trusted Computing’ Frequently Asked Questions — TC / TCG / LaGrande / NGSCB / Longhorn / Palladium / TCPA. Version 1.1, on the Web at http://www.cl.cam.ac.uk/-rj a14/tcpa-faq.html.
Anderson, R. and Needham, R. (1995). Robustness principles for public key protocols. In Advances in Cryptology—CRYPTO ’95, pages 236–247. Springer.
Appel, A. W. and Felten, E. W. (1999). Proof-carrying authentication. In Proceedings of the 5th ACM Conference on Computer and Communications Security, pages 52–62.
Bauer, L., Schneider, M. A., and Felten, E. W. (2002). A general and flexible access-control system for the Web. In Proceedings of the 11th USENIX Security Symposium 2002, pages 93–108.
Box, D., Sells, C., and Pattison, T. (2002). Essential .NET Volume I: The Common Language Runtime. Addison Wesley.
Clarke, D., Elien, J.-E., Ellison, C., Fredette, M., Morcos, A., and Rivest, R. L. (2001). Certificate chain discovery in SPKI/SDSI. Journal of Computer Security, 9(4):285–322.
DeLine, R. and Fahndrich, M. (2001). Enforcing High-Level protocols in Low-Level software. In Proceedings of the ACM SIGPLAN ‘01 Conference on Programming Language Design and Implementation (PLDI-01), volume 36.5 of ACM SIGPLAN Notices, pages 59–69.
DeTreville, J. (2002). Binder, a logic-based security language. In Proceedings ofthe IEEE Symposium on Research in Security and Privacy, pages 105–113.
Dwork, C. and Naor, M. (1992). Pricing via processing or combatting junk mail. In Advances in Cryptology-CRYPTO ’92, pages 139–147. Springer.
England, P., Lampson, B., Manferdelli, J., Peinado, M., and Willman, B. (2003). A trusted open platform. IEEE Computer, 36(7):55–62.
Erlingsson, L. and Schneider, F. B. (2000). IRM enforcement of Java stack inspection. In Proceedings ofthe 2000 IEEE Symposium on Security and Privacy, pages 246–255. IEEE Computer Society Press.
Garfinkel, T., Pfaff, B., Chow, J., Rosenblum, M., and Boneh, D. (2003). Terra: A virtual machine-based platform for trusted computing. In Proceedings of the 19th Symposium on Operating System Principles (SOSP 2003), pages 193–206.
Henzinger, T. A., Jhala, R., Majumdar, R., Necula, G. C., Sutre, G., and Weimer, W. (2002). Temporal-safety proofs for systems code. In Proceedings of the 14th International Conference on Computer Aided Verification (CAV ’02), pages 526–538. Springer.
Howard, M. and LeBlanc, D. (2003). Writing Secure Code. Microsoft Press, 2nd edition.
Jakobsson, M. and Juels, A. (1999). Proofs of work and bread pudding protocols. In Pmceedings of the IFIP TC6 and TC11 Joint Working Conference on Communications and Multimedia Security (CMS ‘99), pages 258–272. Kluwer.
Lampson, B., Abadi, M., Burrows, M., and Wobber, E. (1992). Authentication in distributed systems: Theory and practice. ACM Transactions on Computer Systems, 10(4):265–310.
Leroy, X. (2002). Bytecode verification on Java smart cards. Software — Practice and Experience, 32(4):319–340.
Lie, D., Thekkath, C., Mitchell, M., Lincoln, P., Boneh, D., Mitchell, J., and Horowitz, M. (2000). Architectural support for copy and tamper resistant software. In Ninth International ACM Conference on Architectural Supportfor Programming Languages and Operating Systems (ASPLOS-IX, pages 168–177.
Lindholm, T. and Yellin, F. (1999). The Java Virtual Machine Specification. Addison Wesley, 2nd edition.
Myers, A. C. (1999). JFlow: Practical mostly-static information flow control. In Conference Record of POPL ’99: The 26th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, pages 228–241.
Necula, G. C. (1997). Proof-canying code. In Conference Record ofPOPL ’97: The 24THACM SIGPLAIVSIGACT Symposium on Principles ofProgramming Languages, pages 106–119.
Necula, G. C. (2001). A scalable architecture for proof-carrying code. In Functional and Logic Programming, 5th International Symposium, FLOPS 2001, pages 21–39. Springer.
Pnueli, A., Siegel, M., and Singerman, E. (1998). Translation validation. In Proceedings of the 25th International Colloquium on Automata, Languages, and Pmgramming (ICALP 1998), volume 1384, pages 235–246. Springer.
Stallman, R. (2002). Can you trust your computer? On the Web at http://www.gnu.org/philosophy/can-you-trust.html.
Wobber, E., Abadi, M., Burrows, M., and Lampson, B. (1994). Authentication in the Taos operating system. ACM Transactions on Computer Systems, 12(1):3–32.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2004 IFIP International Federation for Information Processing
About this paper
Cite this paper
Abadi, M. (2004). Trusted Computing, Trusted Third Parties, and Verified Communications. In: Deswarte, Y., Cuppens, F., Jajodia, S., Wang, L. (eds) Security and Protection in Information Processing Systems. SEC 2004. IFIP — The International Federation for Information Processing, vol 147. Springer, Boston, MA. https://doi.org/10.1007/1-4020-8143-X_19
Download citation
DOI: https://doi.org/10.1007/1-4020-8143-X_19
Publisher Name: Springer, Boston, MA
Print ISBN: 978-1-4757-8016-1
Online ISBN: 978-1-4020-8143-9
eBook Packages: Springer Book Archive