Research
 

SIS Research Area - Information Security & Trust

Research Theme
Trusted Computing Technology

Central Concerns and Questions

It has been recognised in the security research community that software alone does not provide an adequate foundation for building a high-assurance trusted platform. The Trusted Computing Group (TCG) defines a set of specifications aiming to provide hardware based root of trust and a set of primitive functions to propagate trust to application software as well as across platforms. The ongoing TCG effort is a result of industry initiatives. There is little coverage of this important technology in the research literature and there is almost no guidance to industry regarding the use of this technology in support of existing and new security applications.

Emerging Ideas and Initiatives

The objectives of our effort on trusted computing research are two fold. First, we study enabling technologies which make the vision of trusted computing possible. Second, we investigate how existing IT applications and services can be improved and explore what new applications and services can be made possible using trusted computing platforms.

Selected Publications

[1] Liang Gu, Xuhua Ding, Robert H. Deng, Bing Xie and Hong Mei. Remote attestation on program execution . Proceedings of the ACM Workshop on Scalable Trusted Computing (STC) , October 2008, Alexandria , USA .

[2]Yanjiang Yang, Robert H. Deng and Feng Bao. Privacy-preserving credentials upon trusted computing augmented servers. Proceedings of the 3rd Information Security Practice and Experience Conference, LNCS 4464, Pages 177-192, Springer, May 2007, Hong Kong , China .

[3] Yanjiang Yang, Yingjiu Li and Robert H. Deng. New paradigm of inference control with trusted computing. Data and Applications Security (DBSEC), LNCS 4602, Pages 243-258, July 2007, Redondo Beach , CA , USA .

[4] Shuhong Wang, Xuhua Ding, Robert H. Deng and Feng Bao. Private information retrieval using trusted hardware. Proceedings of the Enropean Symposium on Research in Computer Security, LNCS 4189, Pages 49-64, September 2006, Hamburg , Germany .

[5] Daniel Chong and Robert H. Deng. Privacy rnhanced superdistribution of layered content with trusted access control. Proceedings of the 6th ACM Workshop on Digital Rights Management , October 2006, Alexandria VA , USA .

Projects, Presentations and Posters

  1. Robert H. Deng, Innovative Applications of Trusted Computing Platform (presentation)
  2. Xuhua Ding, Remote Attestation on Program Execution (presentation)



Last updated on 25 September, 2009 by School of Information Systems.