Physically Restricted Authentication with Trusted Hardware
Page Content
Author
Michael Kirkpatrick, Elisa Bertino
Tech report number
CERIAS TR 2009-18
Abstract
Modern computer systems permit mobile users to access protected information from remote locations. In certain secure environments, it would be desirable to restrict this access to a particular computer or set of computers. Existing solutions of machine-level authentication are undesirable for two reasons. First, they do not allow fine-grained application layer access decisions. Second, they are vulnerable to insider attacks in which a trusted administrator acts maliciously.
In this work, we describe a novel approach using secure hardware that solves these problems.
In our design, multiple administrators are required for installation of a system. After installation,
the authentication privileges are physically linked to that machine, and no administrator can bypass these controls. We define an administrative model and detail the requirements for an authentication protocol to be compatible with our methodology. Our design presents some challenges for large-scale systems, in addition to the benefit of reduced maintenance.
Publication Date
2009-07-03
BibTex-formatted data
To refer to this entry, you may select and copy the text below and paste it into your BibTex document. Note that the text may not contain all macros that BibTex supports.