Towards platform-independent trusted computing

Software independence from hardware platforms is an important feature of growing significance, given the emergence of new distributed computing paradigms. It would be desirable to extend the Trusted Computing mechanisms offered by the Trusted Platform Module into the platform independent Java environment. However, there is currently no generally accepted Trusted Computing API for Java. In this paper, we describe the design of a high-level API for Trusted Computing in Java, which is set to become the new industry standard for Java applications. We describe the current state of the standardization effort being undertaken in Java Specification Request 321 (JSR321).

[1]  Marcel Selhorst,et al.  TSS Study , 2008 .

[2]  Martin Pirker,et al.  A PrivacyCA for Anonymity and Trust , 2009, TRUST.

[3]  Leendert van Doorn,et al.  A Practical Guide to Trusted Computing , 2007 .

[4]  Peter Lipp,et al.  A Practical Approach for Establishing Trust Relationships between Remote Platforms Using Trusted Computing , 2007, TGC.

[5]  Shane Balfe,et al.  Mobile Agents and the Deus Ex Machina , 2007, 21st International Conference on Advanced Information Networking and Applications Workshops (AINAW'07).

[6]  Ahmad-Reza Sadeghi,et al.  Enhancing Grid Security Using Trusted Virtualization , 2007, ATC.

[7]  Stoke Gifford Innovations for the Grid Security from the Trusted Computing , .

[8]  John Lyle Trustable Remote Verification of Web Services , 2009, TRUST.

[9]  Thomas Friese,et al.  Countering security threats in service-oriented on-demand grid computing using sandboxing and trusted computing techniques , 2006, J. Parallel Distributed Comput..

[10]  Michael Philippsen,et al.  Multiparadigm communications in Java for grid computing , 2001, CACM.

[11]  Martin Pirker,et al.  Towards Trust Services for Language-Based Virtual Machines for Grid Computing , 2008, TRUST.

[12]  Wayne Jansen,et al.  NIST Special Publication 800-19 – Mobile Agent Security , 2000 .

[13]  Srinivas Devadas,et al.  Virtual monotonic counters and count-limited objects using a TPM without a trusted OS , 2006, STC '06.

[14]  Martin Pirker,et al.  An ongoing Game of Tetris: Integrating Trusted Computing in Java, block-by-block , 2009 .