Abstract
We developed a secure processor that protects foreign software running on an open source operating system (OS). The implementation of such a processor has not been reported yet. The processor is called L-MSP (License-controlling Multi-vendor Secure Processor). In this paper, the relationship between software protection and user privacy is discussed. In general, software protection enables secure distributed computing and copyright protection, but the software might violate user privacy. In the L-MSP system, user privacy is able to be protected by security sandbox and related OS mechanisms which is implemented in an open source. Thus transparency of user privacy protection can be assured on the system.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Welch, V., et al.: Security for Grid Services. In: Twelfth International Symposium on High Performance Distributed Computing (HPDC-12). IEEE Press, Los Alamitos (2003)
Jansen, W.A.: Countermeasures for Mobile Agent Security. In: Twelfth International Symposium on High Performance Distributed Computing (HPDC-12). IEEE Press, Los Alamitos (2003)
Kuhn, M.: The TrustNo1 Cryptoprocessor Concept, CS555 Report, Purdue University (1997)
Lie, D., Thekkath, C., Lincoln, P., Mitchell, M., Boneh, D., Mitchell, J., Horowitz, M.: Architectural Support for Copy and Tamper Resistant Software. In: Proceedings of AASPLOS IX (2000)
Arnold, M.G., Winkel, M.D.: Computer systems to inhibit unauthorized copying, unauthorized usage, and automated cracking of protected software. U.S. Patent Number 4,558,176 (1985)
Eskicioglu, A.M.: Protecting Intellectual Property in Digital Multimedia Networks. IEEE Computer 36(7), 39–45 (2003)
Media embedded Processor, http://www.mepcore.com/
Takada, H.: TOPPERS Project, http://www.ertl.jp/~hiro/hiro-e.html
Anderson, R.J.: Trusted Computing Frequently Asked Questions, http://www.cl.cam.ac.uk/~rja14/tcpa-faq.html
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2006 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Hashimoto, M., Haruki, H., Kawabata, T. (2006). Secure Processor Consistent with Both Foreign Software Protection and User Privacy Protection. In: Christianson, B., Crispo, B., Malcolm, J.A., Roe, M. (eds) Security Protocols. Security Protocols 2004. Lecture Notes in Computer Science, vol 3957. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11861386_33
Download citation
DOI: https://doi.org/10.1007/11861386_33
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-40925-0
Online ISBN: 978-3-540-40926-7
eBook Packages: Computer ScienceComputer Science (R0)