Abstract
One method for establishing a trust relationship between a server and its clients in a co-operative information system is to use a digital certificate. The use of digital certificates bound to a particular machine works well under the assumption that the underlying computing and networking infrastructure is managed by a single enterprise. Furthermore, managed infrastructures are assumed to have a controlled operational environment, including execution of a standard set of applications and operating system. These assumptions are also valid for recent proposals on establishing trust using hardware-supported systems based on a Trusted Computing Module (TPM) cryptographic microcontroller. However, these assumptions do not hold in today’s cooperative information systems. Clients are mobile and work using network connections that go beyond the administrative boundaries of the enterprise. In this paper, we propose a novel technology, called Trust Extension Device (TED), which enables mobility and portability of trust in cooperative information systems that works in a heterogeneous environment. The paper provides an overview of the technology by describing its design, a conceptual implementation and its use in an application scenario.
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
TCG specification v1.1, https://www.trustedcomputinggroup.org/specs/TPM/
http://changingminds.org/explanations/trust/what_is_trust.htm
Satizábal, C., Páez, R., Forné, J.: Relationships: from a Hybrid Architecture to a Hierarchical Model. In: Proceedings of the First International Conference on Availability, Reliability and Security (ARES 2006)
Yang, R., He, L., Yang, S., Gary, F., Liu, F., Chang, J., Guo, M.: The Value of Hardware-Based Security Solutions and its Architecture for Security Demanding Wireless Services. Security and Management , pp.509–514 (2006)
Nepal, S., Zic, J., Kraehenbuehl, G., Jaccard, F.: A trusted system for sharing patient electronic records in autonomous distributed healthcare systems. International Journal of Healthcare Information Systems and Informatics 2(1), 14–34 (2007)
Nepal, S., Zic, J., Jaccard, F., Krachenbuehl, G.: A Tag-based Data model for privacy-preserving medical applications. In: Proceedings of EDBT IIHA Workshop, Munich, Germany, pp. 77–88 (2006)
Nepal, S., Zic, J., Krachenbuehl, G., Jaccard, F.: Secure Sharing of Electronic Patient Records, 1s t European Conference on eHealth, pp. 47–58. Fribourg, Switzerland (2006)
Jang, J., Nepal, S., Zic, J.: Establishing a Trust Relationship in Cooperative Information Systems. In: Meersman, R., Tari, Z. (eds.) Proceedings of Cooperative Information Systems (CoopIS) 2006 International Conference. LNCS, vol. 4275, pp. 426–443. Springer, Heidelberg (2006)
Nepal, S., Zic, J.: A Portable Trusted Device, Provisional Australian Patent, September (2006)
Caceres, R., Carter, C., Narayanaswami, C., Raghunath, M.T.: Reincarnating PCs with Portable SoulPads. In: Proc of ACM/USENIX MobiSys, pp. 65–78 (2005)
Kennell, R., Jamieson, L.H.: Establishing the genuinity of remote computer systems. In: Proceedings of the 11th USENIX Security Symposium, USENIX, August (2003)
Seshadri, A., Perrig, A., van Doorn, L., Khosla, P.: SWAtt: SoftWare-based Attestation for embedded devices. In: Proceedings of IEEE Symposium on Security and Privacy, (May 2004)
Monrose, F., Wyckoff, P., Rubin, A.D.: Distributed execution with remote audit. In: ISOC Network and Distributed System Security Symposium, pp. 103–113 (1999)
Haldar, V., Franz, M.: Symmetric Behavior-Based Trust: A New Paradigm for Internet Computing. In: New Security Paradigms Workshop (September 2004)
Reid, J., Juan, M., Nieto, G., Dawson, E., Okamoto, E.: Privacy and Trusted Computing. In: Mařík, V., Štěpánková, O., Retschitzegger, W. (eds.) DEXA 2003. LNCS, vol. 2736, p. 383. Springer, Heidelberg (2003)
AMD platform for trustworthy computing. WinHEC 2003, http://www.microsoft.com/whdc/winhec/papers03.mspxSept.2003
Millen, J.K., Wright, R.N.: Reasoning about Trust and Insurance in a Public Key Infrastructure, 13th IEEE Computer Security Foundations Workshop(CSFW), 2000, pp. 16–22 (2000)
Garfinkel, T., Pfaff, B., Chow, J., Rosenblum, M., Boneh, D.: Terra: A virtual machine-based platform for trusted computing. In: Proceedings of Symposium on Operating System Principles (SOSP) (October 2003)
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 2007 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Nepal, S., Zic, J., Hwang, H., Moreland, D. (2007). Trust Extension Device: Providing Mobility and Portability of Trust in Cooperative Information Systems. In: Meersman, R., Tari, Z. (eds) On the Move to Meaningful Internet Systems 2007: CoopIS, DOA, ODBASE, GADA, and IS. OTM 2007. Lecture Notes in Computer Science, vol 4803. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-76848-7_17
Download citation
DOI: https://doi.org/10.1007/978-3-540-76848-7_17
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-76846-3
Online ISBN: 978-3-540-76848-7
eBook Packages: Computer ScienceComputer Science (R0)