Publication
Information Security Technical Report
Paper

Trusted computing and open source

View publication

Abstract

Trusted computing can help defend Linux and other open source operating systems and applications from attack. It can help protect desktop and mobile Linux clients from on-line and off-line integrity and confidentiality attacks. It can measure and remotely attest to the integrity of a system. It can provide authentication mechanisms which are resistant to phishing and pharming attacks. This paper describes the features of Trusted Computing's Trusted Platform Module (TPM), shows how the TPM can provide these protections, and summarizes work in the open source community to implement them. © 2005 Elsevier Ltd. All rights reserved.

Date

Publication

Information Security Technical Report

Authors

Share