Trusted computing for disk drives and other peripherals

R Thibadeau - IEEE Security & Privacy, 2006 - ieeexplore.ieee.org
R Thibadeau
IEEE Security & Privacy, 2006ieeexplore.ieee.org
Trusted Computing for Disk Drives and Other Peripherals Page 1 Peripheral Devices Every
peripheral device in a computer has a role to play with respect to security, privacy, and trust.
Iván Arce notes in “Bad Peripherals”1 that peri- pherals require security, too, and points out the
need for a framework for securing them. At Seagate Research, we developed such a
framework, which we presented to the Trusted Computing Group’s (TCG’s) Storage and
Peripherals Work Groups (www.trustedcomputinggroup.org). The framework proposes a model …
Disk drives and other intelligent peripherals are critical to security, privacy, and trust in the computing infrastructure. This article proposes a framework to describe why and how these peripheral devices can be secured as independent roots of trust
ieeexplore.ieee.org