Scheduling the execution of credentials in constrained secure environments

Jan-Erik Ekberg, N. Asokan, Kari Kostiainen, Aarne Rantala

Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

17 Citations (Scopus)

Abstract

A new inexpensive approach for using credentials in a secure manner has become available due to the fact that several types of general-purpose secure hardware, like TPMs, Mshield and ARM TrustZone are becoming widely deployed. These technologies still have limitations, one being the limited on-chip secure memory which leads to severe size constraints for credentials that need to execute in secure memories. In this paper, we describe, in the context of a credential provisioning and execution architecture we call On-board Credentials (ObC), a secure scheduling mechanism for overcoming some of the size constraints imposed for the virtual credentials implemented on ObC.
Original languageEnglish
Title of host publicationProceedings of the 3rd ACM workshop on Scalable trusted computing
Subtitle of host publicationSTC '08
EditorsShouhuai Xu, Cristina Nita-Rotaru, Jean-Pierre Seifert
Place of PublicationNew York
PublisherAssociation for Computing Machinery ACM
Pages61-70
ISBN (Print)978-1-60558-295-5
DOIs
Publication statusPublished - 2008
MoE publication typeA4 Article in a conference publication
Event3rd ACM workshop on Scalable trusted computing - Fairfax, United States
Duration: 31 Oct 200831 Oct 2008

Conference

Conference3rd ACM workshop on Scalable trusted computing
Country/TerritoryUnited States
CityFairfax
Period31/10/0831/10/08

Fingerprint

Dive into the research topics of 'Scheduling the execution of credentials in constrained secure environments'. Together they form a unique fingerprint.

Cite this