Abstract
Information systems controlling critical infrastructures are vital elements of our modern society. Purely software-based protection techniques have demonstrated limits in fending off attacks and providing assurance of correct configuration. Trusted computing techniques promise to improve over this situation by using hardware-based security solutions. This paper introduces the foundations of trusted computing and discusses how it can be usefully applied to the protection of critical information systems.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Open Trusted Computing (OpenTC) project, IST-027635, http://www.opentc.net
Trusted Computing Group, http://www.trustedcomputing.org
AMD Virtualization, http://www.amd.com/virtualization
Intel Trusted Execution Technology, http://www.intel.com/technology/security/
OpenTC newsletter no.3, http://www.opentc.net/publications/OpenTC_Newsletter_03.html
OpenTC newsletter no.5, http://www.opentc.net/publications/OpenTC_Newsletter_05.html
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2009 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Lioy, A., Ramunno, G., Vernizzi, D. (2009). Trusted-Computing Technologies for the Protection of Critical Information Systems. In: Corchado, E., Zunino, R., Gastaldo, P., Herrero, Á. (eds) Proceedings of the International Workshop on Computational Intelligence in Security for Information Systems CISIS’08. Advances in Soft Computing, vol 53. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-88181-0_10
Download citation
DOI: https://doi.org/10.1007/978-3-540-88181-0_10
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-88180-3
Online ISBN: 978-3-540-88181-0
eBook Packages: EngineeringEngineering (R0)