Presentation is loading. Please wait.

Presentation is loading. Please wait.

Copyright © 1995-2006 Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE USC CSci599 Trusted Computing - Lecture Fourteen.

Similar presentations


Presentation on theme: "Copyright © 1995-2006 Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE USC CSci599 Trusted Computing - Lecture Fourteen."— Presentation transcript:

1 Copyright © 1995-2006 Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE USC CSci599 Trusted Computing - Lecture Fourteen Current Topics 20 April 2007 Dr. Clifford Neuman University of Southern California Information Sciences Institute

2 Copyright © 1995-2006 Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE Announcements Additional lecture audio posted –(thanks Rob Huber) Next week is final lecture –Projects due Class Evaluation Next Week

3 Copyright © 1995-2006 Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE Presentations Diana Kirtley Vijay Gopala Krishnan (possibly)

4 Copyright © 1995-2006 Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE TC and Distributed Firewalls Product space for firewalls –Traditional firewalls –Host based firewalls –Embedded firewalls –Distributed firewalls Benefits of each Limitations of each How can trusted computing help What about TVSA

5 Copyright © 1995-2006 Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE TC and Reputation Based Systems How TC can help –Limit number of identities –Manage reputation directly –Protect credentials use by participants What about reputation used for TC –How we determine which programs are trusted.

6 Copyright © 1995-2006 Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE TC and Performance Costs of trusted computing lie in: –Measurement during load –Crypto for attestation “Quote” –Managing “what” is allowed –Overhead of virtualization –Human costs of separation

7 Copyright © 1995-2006 Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE TC and Mobile Devices Using mobile devices as “trusted path” to user –Attestation enables trusted device to verify integrity of the device that is requesting path to user. –Some of these ideas are being explored by Adrian Perrig at CMU –(work some examples)

8 Copyright © 1995-2006 Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE TC and Forensics Chain of custody is important for forensics –A TPM that signs and dates something in such a way that it can not be later modified – even by the person possessing it, can replace traditional chain of custody. –Must argue that the TPM can not be compromised. –A way of linking series of attestations can help.


Download ppt "Copyright © 1995-2006 Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE USC CSci599 Trusted Computing - Lecture Fourteen."

Similar presentations


Ads by Google