Analysis of property based attestation in trusted platforms

Aarthi Nagarajan*, Vijay Varadharajan, Michael Hitchens

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionpeer-review

2 Citations (Scopus)

Abstract

Binary attestation in trusted computing platforms provide the ability to reason about the state of a system using hash measurements. Property based attestation on the other hand enables more meaningful attestation by abstracting low level binary values to high level security properties or functions of systems. In this paper, we try to understand the kind of security properties that trusted platforms can attest. We propose that security properties can have different levels of granularity and provide a pyramid model that classifies properties at four different levels. We leverage the Common Criteria framework for security requirements to provide examples of such properties. The model is then implemented in the context of authorisation for Web services.

Original languageEnglish
Title of host publicationProceedings - IEEE/IFIP International Conference on Embedded and Ubiquitous Computing, EUC 2010
Place of PublicationPiscataway, NJ
PublisherInstitute of Electrical and Electronics Engineers (IEEE)
Pages833-840
Number of pages8
ISBN (Print)9780769543222
DOIs
Publication statusPublished - 2010
EventIEEE/IFIP 8th International Conference on Embedded and Ubiquitous Computing, EUC 2010 - Hong Kong, China
Duration: 11 Dec 201013 Dec 2010

Other

OtherIEEE/IFIP 8th International Conference on Embedded and Ubiquitous Computing, EUC 2010
Country/TerritoryChina
CityHong Kong
Period11/12/1013/12/10

Fingerprint

Dive into the research topics of 'Analysis of property based attestation in trusted platforms'. Together they form a unique fingerprint.

Cite this