Trusted-Computing Technologies for the Protection of Critical Information Systems

  • Antonio Lioy
  • Gianluca Ramunno
  • Davide Vernizzi
Part of the Advances in Soft Computing book series (AINSC, volume 53)

Abstract

Information systems controlling critical infrastructures are vital elements of our modern society. Purely software-based protection techniques have demonstrated limits in fending off attacks and providing assurance of correct configuration. Trusted computing techniques promise to improve over this situation by using hardware-based security solutions. This paper introduces the foundations of trusted computing and discusses how it can be usefully applied to the protection of critical information systems.

Keywords

Critical infrastructure protection trusted computing security assurance 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Open Trusted Computing (OpenTC) project, IST-027635, http://www.opentc.net
  2. 2.
    Trusted Computing Group, http://www.trustedcomputing.org
  3. 3.
  4. 4.
    Intel Trusted Execution Technology, http://www.intel.com/technology/security/
  5. 5.
  6. 6.

Copyright information

© Springer-Verlag Berlin Heidelberg 2009

Authors and Affiliations

  • Antonio Lioy
    • 1
  • Gianluca Ramunno
    • 1
  • Davide Vernizzi
    • 1
  1. 1.Dip. di Automatica e InformaticaPolitecnico di TorinoTorinoItaly

Personalised recommendations