Attestation with trusted configuration machine
Remote attestation of system integrity is an important part of trusted computing for building and improving trustworthiness in networked environments. Many attestation techniques have been introduced in order to vouch for the accuracy of the information and to protect the privacy of the host platfor...
Saved in:
Published in: | 2011 IEEE International Conference on Computer Applications and Industrial Electronics (ICCAIE) pp. 570 - 573 |
---|---|
Main Authors: | , , , |
Format: | Conference Proceeding |
Language: | English |
Published: |
IEEE
01-12-2011
|
Subjects: | |
Online Access: | Get full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Summary: | Remote attestation of system integrity is an important part of trusted computing for building and improving trustworthiness in networked environments. Many attestation techniques have been introduced in order to vouch for the accuracy of the information and to protect the privacy of the host platform. Here, we propose an enhanced integrity measurement approach based on white list foundation which can generate integrity proof for remote parties. Since existing implementations of remote attestation do not focus on Endorsement Key certificates, we propose a mechanism to handle the generation and verification of this certificate. This approach employs a trusted environment framework hence enabling high confidence in client-server system integrity. |
---|---|
ISBN: | 1457720582 9781457720581 |
DOI: | 10.1109/ICCAIE.2011.6162199 |