Trust and Trusted Computing Platforms

reportActive / Technical Report | Accession Number: ADA536188 | Open PDF

Abstract:

Hardware-based trusted computing platforms are intended to overcome many of the problems of trust that are prominent in computing systems. In this paper, a result of the Software Engineering Institutes Independent Research and Development Project Trusted Computing in Extreme Adversarial Environments Using Trusted Hardware as a Foundation for Cyber Security, we discuss the capabilities and limitations of the Trusted Platform Module TPM. We describe credential storage, device identity, chains of trust, and other techniques for extending hardware-based trust to higher levels of software-based infrastructure. We then examine the character of trust and identify strategies for increasing trust. We show why acceptance of TPM-based trust has been limited to date and suggest that broader acceptance will require more focus on traditional trust issues and on end-to-end services.

Security Markings

DOCUMENT & CONTEXTUAL SUMMARY

Distribution:
Approved For Public Release
Distribution Statement:
Approved For Public Release; Distribution Is Unlimited.

RECORD

Collection: TR
Identifying Numbers
Subject Terms