Trusted Computing Serving an Anonymity Service

  • Alexander Böttcher
  • Bernhard Kauer
  • Hermann Härtig
Conference paper

DOI: 10.1007/978-3-540-68979-9_11

Volume 4968 of the book series Lecture Notes in Computer Science (LNCS)
Cite this paper as:
Böttcher A., Kauer B., Härtig H. (2008) Trusted Computing Serving an Anonymity Service. In: Lipp P., Sadeghi AR., Koch KM. (eds) Trusted Computing - Challenges and Applications. Trust 2008. Lecture Notes in Computer Science, vol 4968. Springer, Berlin, Heidelberg

Abstract

We leveraged trusted computing technology to counteract certain insider attacks. Furthermore, we show with one of the rare server based scenarios that an anonymity service can profit from trusted computing. We based our design on the Nizza Architecture [14] with its small kernel and minimal multi-server OS. We even avoided Nizza’s legacy container and got a much smaller, robust and hopefully more secure system, since we believe that minimizing the trusted computing base is an essential requirement for trust into software.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Copyright information

© Springer-Verlag Berlin Heidelberg 2008

Authors and Affiliations

  • Alexander Böttcher
    • 1
  • Bernhard Kauer
    • 1
  • Hermann Härtig
    • 1
  1. 1.Department of Computer Science Operating Systems GroupTechnische Universität DresdenDresdenGermany