summaryrefslogtreecommitdiff
path: root/2005/flow-accounting-ols2005/OLS2005/ratliff/ratliff-abstract.tex
diff options
context:
space:
mode:
Diffstat (limited to '2005/flow-accounting-ols2005/OLS2005/ratliff/ratliff-abstract.tex')
-rw-r--r--2005/flow-accounting-ols2005/OLS2005/ratliff/ratliff-abstract.tex31
1 files changed, 31 insertions, 0 deletions
diff --git a/2005/flow-accounting-ols2005/OLS2005/ratliff/ratliff-abstract.tex b/2005/flow-accounting-ols2005/OLS2005/ratliff/ratliff-abstract.tex
new file mode 100644
index 0000000..ae3833a
--- /dev/null
+++ b/2005/flow-accounting-ols2005/OLS2005/ratliff/ratliff-abstract.tex
@@ -0,0 +1,31 @@
+
+% Registration Trusted Computing and Linux
+% [2]Register/Submit Proposal Emily Ratliff (emilyr@us.ibm.com)
+
+
+While Trusted Computing and Linux may seem
+antithetical on the surface, Linux users can
+benefit from the security features, including
+system integrity and key confidentiality,
+provided by Trusted Computing. The purpose of
+this paper is to discuss the work that we have
+done to enable Linux users to make use of
+their Trusted Platform Module (TPM) in a
+non-evil manner. The paper describes the
+individual software components which are
+required to enable the use of the TPM,
+including the TPM device driver and TrouSerS,
+the Trusted Software Stack, and TPM
+management. Key concerns with Trusted
+Computing are highlighted along with what the
+Trusted Computing Group has done and what
+individual TPM owners can do to mitigate these
+concerns. Example beneficial uses for
+individuals and enterprises are discussed
+including eCryptfs and GnuPG usage of the TPM.
+There is a tremendous opportunity for enhanced
+security through enabling projects to use the
+TPM so we discuss what we see as the most
+promising avenues.
+
+
personal git repositories of Harald Welte. Your mileage may vary