{"title":"一种建立可信应用程序的方法","authors":"M. Isa, J. Manan, R.M.R.R.A. Sufian, A. A. Talib","doi":"10.1109/NETAPPS.2010.35","DOIUrl":null,"url":null,"abstract":"Trusted Computing offer great opportunities to enhance security and privacy of the user. Trusted Platform Module (TPM) is the implementation of the trusted platform initiatives on a chip under Trusted Computing Group (TCG). The TPM chip that is similar to smart card but hardwired onto motherboard, hence making it tamper resistant from remote attack. To interface with the TPM chip, the TCG prescribe a standard interface to communicate with the TPM. However, there are some difficulties in interfacing an application to the TPM. Acquiring full knowledge of Trusted Computing is a critical success factor to successfully modify existing application including design, coding and testing the TPM based application. This paper presents a method that allows existing application running on a platform without a TPM to utilize the TPM functionalities.","PeriodicalId":265699,"journal":{"name":"2010 Second International Conference on Network Applications, Protocols and Services","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2010-09-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"7","resultStr":"{\"title\":\"An Approach to Establish Trusted Application\",\"authors\":\"M. Isa, J. Manan, R.M.R.R.A. Sufian, A. A. Talib\",\"doi\":\"10.1109/NETAPPS.2010.35\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Trusted Computing offer great opportunities to enhance security and privacy of the user. Trusted Platform Module (TPM) is the implementation of the trusted platform initiatives on a chip under Trusted Computing Group (TCG). The TPM chip that is similar to smart card but hardwired onto motherboard, hence making it tamper resistant from remote attack. To interface with the TPM chip, the TCG prescribe a standard interface to communicate with the TPM. However, there are some difficulties in interfacing an application to the TPM. Acquiring full knowledge of Trusted Computing is a critical success factor to successfully modify existing application including design, coding and testing the TPM based application. This paper presents a method that allows existing application running on a platform without a TPM to utilize the TPM functionalities.\",\"PeriodicalId\":265699,\"journal\":{\"name\":\"2010 Second International Conference on Network Applications, Protocols and Services\",\"volume\":\"1 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2010-09-22\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"7\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2010 Second International Conference on Network Applications, Protocols and Services\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/NETAPPS.2010.35\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2010 Second International Conference on Network Applications, Protocols and Services","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/NETAPPS.2010.35","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Trusted Computing offer great opportunities to enhance security and privacy of the user. Trusted Platform Module (TPM) is the implementation of the trusted platform initiatives on a chip under Trusted Computing Group (TCG). The TPM chip that is similar to smart card but hardwired onto motherboard, hence making it tamper resistant from remote attack. To interface with the TPM chip, the TCG prescribe a standard interface to communicate with the TPM. However, there are some difficulties in interfacing an application to the TPM. Acquiring full knowledge of Trusted Computing is a critical success factor to successfully modify existing application including design, coding and testing the TPM based application. This paper presents a method that allows existing application running on a platform without a TPM to utilize the TPM functionalities.