2006
DOI: 10.1007/11690634_8
|View full text |Cite
|
Sign up to set email alerts
|

Dynamic Policy Discovery with Remote Attestation

Abstract: Abstract. Remote attestation allows programs running on trusted hardware to prove their identity (and that of their environment) to programs on other hosts. Remote attestation can be used to address security concerns if programs agree on the meaning of data in attestations. This paper studies the enforcement of codeidentity based access control policies in a hostile distributed environment, using a combination of remote attestation, dynamic types, and typechecking. This ensures that programs agree on the meani… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3

Citation Types

0
5
0

Year Published

2007
2007
2023
2023

Publication Types

Select...
3
1
1

Relationship

1
4

Authors

Journals

citations
Cited by 5 publications
(5 citation statements)
references
References 59 publications
(64 reference statements)
0
5
0
Order By: Relevance
“…Two frameworks supporting RA based on the π-calculus are presented in the extended abstract by Pitcher and Riely [38] and the paper by Cirillo and Riely [39]. Contrary to our model, these frameworks deal with S-RTM, thus putting a lot of effort into maintaining the chain of trust.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Two frameworks supporting RA based on the π-calculus are presented in the extended abstract by Pitcher and Riely [38] and the paper by Cirillo and Riely [39]. Contrary to our model, these frameworks deal with S-RTM, thus putting a lot of effort into maintaining the chain of trust.…”
Section: Related Workmentioning
confidence: 99%
“…Moreover, in the paper by Cirillo and Riely, the framework is an extension of a higherorder π-calculus, i.e., a version of the π-calculus where terms can contain programs. These frameworks [38], [39] are both typed and the type system is used to specify access policies based on the remote attestation primitive. In these frameworks one cannot use attestation to identify a program, only to prove that it satisfies the type system.…”
Section: Related Workmentioning
confidence: 99%
“…Klaim (see [11] for a survey) is a Linda-tuple based programming model with a notion of named locations with access control policies that specify the capabilities of the location. A similar approach is taken in [28,37,36]. [15] and [19] explore role-based access control in the context of mobile process calculi.…”
Section: Related Workmentioning
confidence: 99%
“…In disaster-tolerant systems, besides adopting high performance disaster-tolerant technology, it is also quite necessary to assure terminal trustworthiness in disaster-tolerant systems and the safety of data storage, in order to ensure a more robust data security. Therefore, it is of great importance to study the terminal of disaster-tolerant systems and security enhancement technology of disaster-tolerant data [1] .Except for various kinds of traditional security enhancement technologies [2] , we usually need to run an attestation protocol [3] to verify the degree of trust involving the terminal of disaster-tolerant systems. Apart from the early popular security protocols [4] , there are a great many practical protocols such as the Kerberos protocol [5] .…”
mentioning
confidence: 99%
“…Except for various kinds of traditional security enhancement technologies [2] , we usually need to run an attestation protocol [3] to verify the degree of trust involving the terminal of disaster-tolerant systems. Apart from the early popular security protocols [4] , there are a great many practical protocols such as the Kerberos protocol [5] .…”
mentioning
confidence: 99%