Future of Trust in Computing (eBook)
X, 227 Seiten
Vieweg & Teubner (Verlag)
978-3-8348-9324-6 (ISBN)
David Grawrock is a Senior Principal Engineer and Security Architect for the Initiatives, Technology Pathfinding and Planning group at Intel Corp (USA).
Helmut Reimer is Senior Partner at TeleTrusT Deutschland e.V.
Ahmad-Reza Sadeghi is the Head of System Security Group at Horst Goertz Institute for IT Security at Ruhr-University Bochum, Germany.
Claire Vishik is Security & Privacy Standards & Policy Manager at Intel Corp (UK).
David Grawrock is a Senior Principal Engineer and Security Architect for the Initiatives, Technology Pathfinding and Planning group at Intel Corp (USA). Helmut Reimer is Senior Partner at TeleTrusT Deutschland e.V. Ahmad-Reza Sadeghi is the Head of System Security Group at Horst Goertz Institute for IT Security at Ruhr-University Bochum, Germany. Claire Vishik is Security & Privacy Standards & Policy Manager at Intel Corp (UK).
Contents 6
Foreword 9
Session 1:Security Environmentand Threats 10
Study on Information Security and e-Trust in Spanish households 11
1 Objectives 11
2 Methodological design 12
3 Main results 17
4 Conclusion 22
Session 2: Technical Issues with Trust in Computing and Proposed Solutions 23
Implementing a Portable Trusted Environment 24
1 Introduction 24
2 A Trusted Medical Application 25
3 The Trust Extension Device 27
4 TED Application: Trusted Email Client 32
5 Conclusions 35
New Directions for Hardware-assistedTrusted Computing Policies(Position Paper) 37
1 Introduction 37
2 Policy Engineering 39
3 Traps and Security 40
4 Proposed Hardware Features 42
5 Self-healing Perspective 43
6 Conclusion 43
7 Acknowledgements 44
Smart Cards and remote entrusting 45
1 Introduction 45
2 Remote Entrusting 46
3 The USB Smart Card 48
4 Levels of Trust 49
5 Limitations 51
6 Conclusion 52
Session 3: Designing for the Future:New Approaches 53
Future Threats to Future Trust 54
1 The Forward workshops and threats on the net 54
2 Trust in critical and large-scale systems 55
3 Fraud and the lack of trust 57
4 Malware 58
5 Concluding remarks 59
6 Acknowledgements 59
Trusted Trustworthy ProofPosition Paper 60
1 The Security Challenge 60
2 Trust and Trustworthiness 61
3 Requirements 62
4 Can it be Achieved? 63
5 Cost 63
6 Conclusions 64
An ongoing Game of Tetris:Integrating Trusted Computing in Java,block-by-block 65
1 Introduction 65
2 The Pieces of the Game 67
3 Conclusions and Outlook 71
TrustCube: An Infrastructure thatBuilds Trust in Client 73
1 Introduction 73
2 Related Works 74
3 TrustCube Infrastructure 77
4 Conclusion and Future Works 84
Session 4: Obtaining Trust and Modeling Trust Environments 85
Trust-based Information Sharing in Collaborative Communities: Issues and Challenges 86
1 Introduction 86
2 State of the art 88
3 Access control requirements 89
4 Trust-based Information Sharing 90
5 Privacy-aware Access Control 92
6 Trust Modelling, Computation and Protection 93
7 Conclusion 94
Can Economics Provide Insights into Trust Infrastructure? 96
1 Introduction 96
2 Problem Statement 97
3 Verification and Authentication Infrastructure 98
4 Exchange Economies, Monetary Economies and Asymmetric Information 99
5 Are Models and Approaches of Theoretical Economics Applicable to This Context? 101
6 Conclusions 103
Reviewing Privacy during Design – Voluntary Technology Dialogue System 105
1 Project Description 105
2 Voluntary Technology Dialogue System 106
3 Conclusion - policy relevance and market impact 109
Session 5: Applications: Trustin Health Systems 112
Trust and Privacy in Healthcare 113
1 Introduction 113
2 Trust in the Healthcare system 114
3 Risk positions in data-sharing 116
4 Risk Appraisal model 117
5 Overall attitude to Data-sharing 120
6 Evidence from the literature 120
7 Effect of countermeasures to reduce risk and improve trust 121
8 Conclusions 122
Protecting Patient Records from Unwarranted Access 124
1 Introduction 124
2 The Electronic Patient Record System 125
3 Protecting Patient Records 126
4 Related Work 128
5 Conclusion 129
Challenges in Data QualityAssurance in PervasiveHealth Monitoring Systems 131
1 Introduction 131
2 Use cases 132
3 Data Quality 134
4 Challenges 136
5 Related Work 140
6 Summary 142
Session 6: Future of Trust: New Models for Network, Device and Infrastructure Security 145
Towards one PC for systems with different security levels 146
1 Introduction 146
2 Virtualization 148
3 Hypervisor architecture 148
4 Hardware trends 150
5 Conclusion 151
Trust Relationships in Networked Context Aware Systems 153
1 Context Aware Systems 153
2 Trust Relationships 154
3 Trust with Networked Context Aware Systems 155
4 Dilemmas with Client Side Optimization 156
5 Dilemmas with Server Side Optimization 156
6 Challenges in Building Trust 157
7 Conclusion 157
Towards Trusted Network Access Control 158
1 Motivation 158
2 Introduction to Trusted Network Connect 159
3 tNAC – Trusted Network Access Control 165
4 Conclusion 167
Session 7: Usability 169
User-Friendly and Secure TPM-based Hard Disk Key Management 170
1 Problem Description 170
2 Solutions 171
3 Protecting System Integrity 174
4 Discussion 175
5 Conclusion 176
Requirements and Design Guidelines for a Trusted Hypervisor Interface 177
1 Introduction 177
2 Usage Scenarios 178
3 Requirements Analysis 179
4 Related Work 181
5 Design Conclusions 183
6 Outlook 187
Session 8: TCG Technology: Issues and Applications 189
Offline dictionary attack on TCG TPM weak authorisation data, and solution 190
1 Introduction 190
2 The Offline dictionary attack 191
3 Password-based key agreement 191
4 Solving the offline authData attack 192
5 Integration with TPM command architecture 193
6 Conclusion 193
Trusted Virtual Disk Images 194
1 Introduction 194
2 Related Work 195
3 Background 195
4 Trusted Vitual Disk Images 197
5 Life cycle 201
6 Conclusion 203
7 Future Work 203
Shall we trust WDDL? 205
1 Introduction 205
2 Timing Analysis of Differential Logic 207
3 Practical Test on DES WDDL Implemented in an Altera Stratix EP1S25 FPGA 209
4 Conclusion 210
Trusted Computing Management Server Making Trusted Computing User Friendly 213
1 Motivation 213
2 Managing and operation tasks for TC platforms 214
3 The Solution: Centralized and integrated Trusted 215
Computing and TPM management by a server. 215
4 Conclusion 218
Index 219
Erscheint lt. Verlag | 26.7.2009 |
---|---|
Zusatzinfo | X, 227 p. 58 illus. |
Verlagsort | Wiesbaden |
Sprache | englisch |
Themenwelt | Informatik ► Netzwerke ► Sicherheit / Firewall |
Schlagworte | computing • Device • Device Security • health systems • Infrastructure • infrastructure security • Network Security • privacy • Security Environment • TCG • TCG Technology • Technical Issues • Technology • threats • Trusted • trusted computing • Trusted Infrastructures • Trusted Infrastructures; |
ISBN-10 | 3-8348-9324-2 / 3834893242 |
ISBN-13 | 978-3-8348-9324-6 / 9783834893246 |
Haben Sie eine Frage zum Produkt? |
Größe: 3,4 MB
DRM: Digitales Wasserzeichen
Dieses eBook enthält ein digitales Wasserzeichen und ist damit für Sie personalisiert. Bei einer missbräuchlichen Weitergabe des eBooks an Dritte ist eine Rückverfolgung an die Quelle möglich.
Dateiformat: PDF (Portable Document Format)
Mit einem festen Seitenlayout eignet sich die PDF besonders für Fachbücher mit Spalten, Tabellen und Abbildungen. Eine PDF kann auf fast allen Geräten angezeigt werden, ist aber für kleine Displays (Smartphone, eReader) nur eingeschränkt geeignet.
Systemvoraussetzungen:
PC/Mac: Mit einem PC oder Mac können Sie dieses eBook lesen. Sie benötigen dafür einen PDF-Viewer - z.B. den Adobe Reader oder Adobe Digital Editions.
eReader: Dieses eBook kann mit (fast) allen eBook-Readern gelesen werden. Mit dem amazon-Kindle ist es aber nicht kompatibel.
Smartphone/Tablet: Egal ob Apple oder Android, dieses eBook können Sie lesen. Sie benötigen dafür einen PDF-Viewer - z.B. die kostenlose Adobe Digital Editions-App.
Zusätzliches Feature: Online Lesen
Dieses eBook können Sie zusätzlich zum Download auch online im Webbrowser lesen.
Buying eBooks from abroad
For tax law reasons we can sell eBooks just within Germany and Switzerland. Regrettably we cannot fulfill eBook-orders from other countries.
aus dem Bereich