summaryrefslogtreecommitdiff
path: root/2005/flow-accounting-ols2005/OLS2005/ratliff/ratliff-abstract.tex
blob: ae3833a6fb2e0c10ddf832f9f808d1dde2557c79 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31

%         Registration                  Trusted Computing and Linux           
%  [2]Register/Submit Proposal Emily Ratliff (emilyr@us.ibm.com)              


While Trusted Computing and Linux may seem     
antithetical on the surface, Linux users can   
benefit from the security features, including  
system integrity and key confidentiality,      
provided by Trusted Computing. The purpose of  
this paper is to discuss the work that we have 
done to enable Linux users to make use of      
their Trusted Platform Module (TPM) in a       
non-evil manner. The paper describes the       
individual software components which are       
required to enable the use of the TPM,         
including the TPM device driver and TrouSerS,  
the Trusted Software Stack, and TPM            
management. Key concerns with Trusted          
Computing are highlighted along with what the  
Trusted Computing Group has done and what      
individual TPM owners can do to mitigate these 
concerns. Example beneficial uses for          
individuals and enterprises are discussed      
including eCryptfs and GnuPG usage of the TPM. 
There is a tremendous opportunity for enhanced 
security through enabling projects to use the  
TPM so we discuss what we see as the most      
promising avenues.                             


personal git repositories of Harald Welte. Your mileage may vary