2009
DOI: 10.1007/978-3-642-00587-9_1
|View full text |Cite
|
Sign up to set email alerts
|

Towards a Programmable TPM

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2009
2009
2015
2015

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 9 publications
(5 citation statements)
references
References 5 publications
0
5
0
Order By: Relevance
“…England and Tariq [1] illustrate the possibility to bind a smart card to the TPM in the context of extending the capabilities of the TPM and exploring the possibility of a "programmable" TPM. Klenk et al [31] propose a somewhat converse approach where they transfuse an eID, normally stored on a smart card, into a TPM key.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…England and Tariq [1] illustrate the possibility to bind a smart card to the TPM in the context of extending the capabilities of the TPM and exploring the possibility of a "programmable" TPM. Klenk et al [31] propose a somewhat converse approach where they transfuse an eID, normally stored on a smart card, into a TPM key.…”
Section: Related Workmentioning
confidence: 99%
“…Authentication tokens such as smart cards enable the authentication of emergency personnel. A combination of both can bind a set of policy enforcing software configurations to cryptographic services or simple cryptographic key protection [1], [2]. This combination can be used for granting access to restricted information and applications, even without an established infrastructure, by caching premeditated trust decisions on the smart card.…”
Section: Introductionmentioning
confidence: 99%
“…An MTM implementation is described in [18], and it is this implementation that we select for our proposed model. It makes use of virtualization under TrEE to further secure the MTM, its keys and registers against rogue commands and other types of attack.…”
Section: Proposed Approach To Se Access Controlmentioning
confidence: 99%
“…A TPM is typically under the control of the platform user, and it has a secure and reliable software/hardware platform. However, it is not a general-purpose execution environment in which an arbitrary code can be executed and neither is it portable, unless a smart card is used to behave like a TPM [57] [59]. In this chapter, we treat TPM and MTM together even though there are subtle di erences between them.…”
Section: Trusted Platform Modulementioning
confidence: 99%