A TPM-Based Protection Mechanism for Remote Attestation Evidence
Shi Guang-yuan (),
Gong Bei () and
Zhu Zhen-Shan ()
Additional contact information
Shi Guang-yuan: Beijing University of Technology
Gong Bei: Beijing University of Technology
Zhu Zhen-Shan: Harbin Engineering University
A chapter in 2012 International Conference on Information Technology and Management Science(ICITMS 2012) Proceedings, 2013, pp 509-520 from Springer
Abstract:
Abstract Remote Attestation is very importance in trusted computing, and the attestation evidence is foundation of the Remote Attestation. However, the existing technologies are not pay close attention on the protection of attestation evidence. In this paper, through research the main technologies of Remote Attestation, and analyze the attestation evidence in each method, providing a TPM-based protection mechanism for remote attestation evidence. The mechanism for Remote Attestation to ensure the secure transmission of the attestation’s information, and designing a common communication protocol to guarantee the confidentiality and integrity of remote attestation’s information in the course of transmission.
Keywords: Remote attestation; Protection; Communication protocol; Trusted computing (search for similar items in EconPapers)
Date: 2013
References: Add references at CitEc
Citations:
There are no downloads for this item, see the EconPapers FAQ for hints about obtaining it.
Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.
Export reference: BibTeX
RIS (EndNote, ProCite, RefMan)
HTML/Text
Persistent link: https://EconPapers.repec.org/RePEc:spr:sprchp:978-3-642-34910-2_60
Ordering information: This item can be ordered from
http://www.springer.com/9783642349102
DOI: 10.1007/978-3-642-34910-2_60
Access Statistics for this chapter
More chapters in Springer Books from Springer
Bibliographic data for series maintained by Sonal Shukla () and Springer Nature Abstracting and Indexing ().