Abstract
Binary attestation in trusted computing platforms provide the ability to reason about the state of a system using hash measurements. Property based attestation on the other hand enables more meaningful attestation by abstracting low level binary values to high level security properties or functions of systems. In this paper, we try to understand the kind of security properties that trusted platforms can attest. We propose that security properties can have different levels of granularity and provide a pyramid model that classifies properties at four different levels. We leverage the Common Criteria framework for security requirements to provide examples of such properties. The model is then implemented in the context of authorisation for Web services.
Original language | English |
---|---|
Title of host publication | Proceedings - IEEE/IFIP International Conference on Embedded and Ubiquitous Computing, EUC 2010 |
Place of Publication | Piscataway, NJ |
Publisher | Institute of Electrical and Electronics Engineers (IEEE) |
Pages | 833-840 |
Number of pages | 8 |
ISBN (Print) | 9780769543222 |
DOIs | |
Publication status | Published - 2010 |
Event | IEEE/IFIP 8th International Conference on Embedded and Ubiquitous Computing, EUC 2010 - Hong Kong, China Duration: 11 Dec 2010 → 13 Dec 2010 |
Other
Other | IEEE/IFIP 8th International Conference on Embedded and Ubiquitous Computing, EUC 2010 |
---|---|
Country/Territory | China |
City | Hong Kong |
Period | 11/12/10 → 13/12/10 |