Security

Trusted Computing and Provenance: Better Together

Download Now Free registration required

Executive Summary

It is widely realised that provenance systems can benefit from greater awareness of security principles and the use of security technology. In this paper, the authors argue that trusted computing, a hardware-based method for establishing platform integrity, is not only useful, but immediately applicable. They demonstrate how existing trusted computing mechanisms can be used for provenance, and identify the remarkable similarity and overlap between the two research areas. This is accomplished through presenting architectural ideas for a trusted provenance system, and by comparing the respective requirements and capabilities of trusted systems and provenance systems.

  • Format: PDF
  • Size: 312.1 KB