Proceedings of the 2007 ACM Workshop on Scalable Trusted Computing 2007
DOI: 10.1145/1314354.1314371
|View full text |Cite
|
Sign up to set email alerts
|

Uclinux

Abstract: Usage controls allow the distributor of some information to limit how recipients of that information may use it. The Trusted Computing Group has standardized Trusted Platform Modules (TPMs) that are built into an increasing number of computers and could greatly harden usage controls against circumvention. However, existing operating systems support TPMs only partially. We describe UCLinux, a novel Linux Security Module that, unlike previous work, supports TPM-based attestation, sealing, and usage controls on e… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
7
0

Year Published

2009
2009
2018
2018

Publication Types

Select...
3
3
1

Relationship

0
7

Authors

Journals

citations
Cited by 22 publications
(7 citation statements)
references
References 8 publications
0
7
0
Order By: Relevance
“…P2P, GRID computing, operating systems, data base management systems, mobile systems, etc. [58,59,61,53,44,62,57,63,60,41,64,39,65,66]. Some of the most interesting approaches are briefly outlined in this subsection.…”
Section: Methodsmentioning
confidence: 99%
See 1 more Smart Citation
“…P2P, GRID computing, operating systems, data base management systems, mobile systems, etc. [58,59,61,53,44,62,57,63,60,41,64,39,65,66]. Some of the most interesting approaches are briefly outlined in this subsection.…”
Section: Methodsmentioning
confidence: 99%
“…In this section, we consider security mechanisms implementable within a computer system used to achieve the UCON security goals and unfeasible to broke in a reasonable time. Security mechanisms for the policy enforcement on local platforms using the SRM are discussed by traditional access control models and are extendable to capture the UCON novelties such as ongoing usage and attribute updates [58][59][60]. Here, we focus on the open distributed computer environment protecting digital objects (e.g.…”
Section: Enforcement Mechanismsmentioning
confidence: 99%
“…UCLinux [111] is a Linux security module [215] that specializes in usage control enforcement and supports attestation and sealing using the TPM. In a nutshell, UCLinux stores usage controlled files within an encrypted file system.…”
Section: Securing Data Usage Control Infrastructuresmentioning
confidence: 99%
“…Since J. Park and R. Sandhu proposed the concept of Usage Control as the key spirit of next generation access control [2], a large amount of research has been being conducted with focus on its development and applications [3][4][5][6][7]. The authors themselves presented the core model of Usage Control as UCON ABC [1].…”
Section: Related Workmentioning
confidence: 99%
“…Park and R. Sandhu proposed a dynamic access control framework, called Usage Control, or UCON [1,2], to deal with the limitations of traditional access control models. The UCON model attracts world-wide attention and is regarded as the next generation access control model [3][4][5][6][7].…”
Section: Introductionmentioning
confidence: 99%