By Topic

Improvement upon architecture of TCG credentials

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$33 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

3 Author(s)
Xing Zhang ; Inst. of Electron. Technol., Inf. Eng. Univ., Zhengzhou ; Lu Zhu ; Sheng Yu

The trusted computing group (TCG) has developed specifications for computing platforms that create a foundation of trust for software processes, based on credentials. But according to research on those credentials, we found management of those credentials is too complicated to implement, and the complication leads to underlying insecurity. The paper proposes a new architecture for credentials, making use of the EK credential and platform identity credential to accomplish the trust mechanism. This is a significant improvement on the previously five credentials required which are now reduced to only three. The proposal provides evidence for superiority in security and availability.

Published in:

Machine Learning and Cybernetics, 2008 International Conference on  (Volume:7 )

Date of Conference:

12-15 July 2008