[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/1655108.1655119acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
short-paper

Towards platform-independent trusted computing

Published: 13 November 2009 Publication History

Abstract

Software independence from hardware platforms is an important feature of growing significance, given the emergence of new distributed computing paradigms. It would be desirable to extend the Trusted Computing mechanisms offered by the Trusted Platform Module into the platform independent Java environment. However, there is currently no generally accepted Trusted Computing API for Java. In this paper, we describe the design of a high-level API for Trusted Computing in Java, which is set to become the new industry standard for Java applications. We describe the current state of the standardization effort being undertaken in Java Specification Request 321 (JSR321).

References

[1]
S. Balfe and E. Gallery. Mobile agents and the deus ex machina. In Proc. AINAW, 2007.
[2]
D. Challener, K. Yoder, R. Catherman, D. Safford, and L. V. Doorn. A Practical Guide to Trusted Computing. IBM Press, 1st edition, 2008.
[3]
K. Dietrich, M. Pirker, T. Vejda, R. Toegl, T. Winkler, and P. Lipp. A practical approach for establishing trust relationships between remote platforms using trusted computing. volume 4912 of LNCS, pages 156--168. Springer Verlag, 2008.
[4]
V. Getov, G. von Laszewski, M. Philippsen, and I. T. Foster. Multiparadigm communications in java for grid computing. Commun. ACM, 44(10):118--125, 2001.
[5]
M. Hermanowski and E. Tews. Tpm4java. http://tpm4java.datenzone.de/trac, 2009.
[6]
IBM Corp. Trousers - an open-source tcg software stack implementation. http://trousers. sourceforge.net/, 2008.
[7]
W. Jansen and T. Karygiannis. NIST special publication 800-19 - mobile agent security. 2000.
[8]
H. Löhr, H. V. Ramasamy, A.-R. Sadeghi, S. Schulz, M. Schunter, and C. Stüble. Enhancing grid security using trusted virtualization. In Proc. ATC, volume 4610 of LNCS, pages 372--384, 2007.
[9]
J. Lyle. Trustable remote verification of web services. volume 5471 of LNCS, pages 153--168. Springer, 2009.
[10]
W. Mao, H. Jin, and A. Martin. Innovations for grid security from trusted computing, 2005.
[11]
M. Pirker, R. Toegl, D. Hein, and P. Danner. A PrivacyCA for anonymity and trust. In Proc. Trust'09, volume 5471 of LNCS. Springer, 2009.
[12]
M. Pirker, R. Toegl, T. Winkler, and T. Vejda et al. Trusted computing for the JavaTMplatform. http://trustedjava.sourceforge.net/, 2009.
[13]
L. Sarmenta, J. Rhodes, and T. Müller. TPM/J Java-based API for the trusted platform module. http://projects.csail.mit.edu/tc/tpmj/, 2007.
[14]
L. Sarmenta, M. van Dijk, C. O'Donnell, J. Rhodes, and S. Devadas. Virtual monotonic counters and count-limited objects using a TPM without a trusted OS. In Proc. STC'06. ACM, 2006.
[15]
M. Selhorst, C. Stueble, and F. Teerkorn. TSS Study. Technical report, Sirrix AG, 2008.
[16]
M. Smith, T. Friese, M. Engel, and B. Freisleben. Countering security threats in service-oriented on-demand grid computing using sandboxing and trusted computing techniques. J. Parallel Distrib. Comput., 66(9):1189--1204, 2006.
[17]
R. Toegl and M. Pirker. An ongoing game of tetris: Integrating trusted computing in java, block-by-block. In Proc. 1st International Conf. Future of Trust in Computing 2008. Vieweg+Teubner, 2009.
[18]
Trusted Computing Group. TCG software stack specification, version 1.2 errata a, 2007.
[19]
Trusted Computing Group. TCG TPM specification version 1.2 revision 103, 2007.
[20]
T. Vejda, R. Toegl, M. Pirker, and T. Winkler. Towards Trust Services for Language-Based Virtual Machines for Grid Computing. In Proc. Trust 2008, volume 4968 of LNCS. Springer, 2008.

Cited By

View all
  • (2017)Applications of Trusted Computing in Cloud ContextResearch Advances in Cloud Computing10.1007/978-981-10-5026-8_18(449-465)Online publication date: 28-Dec-2017
  • (2013)Building a Trusted Environment for Security ApplicationsTheory and Practice of Cryptography Solutions for Secure Information Systems10.4018/978-1-4666-4030-6.ch014(334-360)Online publication date: 2013
  • (2012)Specification and Standardization of a Java Trusted Computing APISoftware—Practice & Experience10.1002/spe.109542:8(945-965)Online publication date: 1-Aug-2012
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Conferences
STC '09: Proceedings of the 2009 ACM workshop on Scalable trusted computing
November 2009
82 pages
ISBN:9781605587882
DOI:10.1145/1655108
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 13 November 2009

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. java
  2. jsr 321
  3. trusted computing

Qualifiers

  • Short-paper

Conference

CCS '09
Sponsor:

Acceptance Rates

Overall Acceptance Rate 17 of 31 submissions, 55%

Upcoming Conference

CCS '25

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)5
  • Downloads (Last 6 weeks)2
Reflects downloads up to 25 Dec 2024

Other Metrics

Citations

Cited By

View all
  • (2017)Applications of Trusted Computing in Cloud ContextResearch Advances in Cloud Computing10.1007/978-981-10-5026-8_18(449-465)Online publication date: 28-Dec-2017
  • (2013)Building a Trusted Environment for Security ApplicationsTheory and Practice of Cryptography Solutions for Secure Information Systems10.4018/978-1-4666-4030-6.ch014(334-360)Online publication date: 2013
  • (2012)Specification and Standardization of a Java Trusted Computing APISoftware—Practice & Experience10.1002/spe.109542:8(945-965)Online publication date: 1-Aug-2012
  • (2011)myTrustedCloudProceedings of the 2011 IEEE Third International Conference on Cloud Computing Technology and Science10.1109/CloudCom.2011.41(247-254)Online publication date: 29-Nov-2011
  • (2010)µTSSProceedings of the 3rd international conference on Trust and trustworthy computing10.5555/1875652.1875662(124-140)Online publication date: 21-Jun-2010
  • (2010)μTSS – A Simplified Trusted Software StackTrust and Trustworthy Computing10.1007/978-3-642-13869-0_9(124-140)Online publication date: 2010

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media