Abstract
Trust has various instantiations: some rely on real-world relationships between entities, while others depend on robust hardware and software technologies to establish it post-deployment. In this paper, we focus on the latter, analyse their evolution in previous years, and their scope in the near future. The evolution of such technologies has involved diverse approaches; consequently, trust is understood and ascertained differently across heterogeneous systems and domains. We look at trusted hardware and software technologies from a security perspective – revisiting and analysing the Trusted Platform Module (TPM); Secure Elements (SE); hypervisors and virtualisation, including Java Card and Intel's Trusted eXecution Technology (TXT); Trusted Execution Environments (TEEs), such as GlobalPlatform TEE and Intel SGX; Host Card Emulation (HCE); and the Encrypted Execution Environment (E3). In our analysis, we focus on these technologies and their application to the emerging domains of the Internet of Things (IoT) and Cyber-Physical Systems (CPS).
| Original language | English |
|---|---|
| Title of host publication | 15th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-16). |
| Editors | Yang Xiang, Kui Ren, Dengguo Feng |
| Publisher | IEEE Computer Society |
| Pages | 168-177 |
| Number of pages | 10 |
| ISBN (Electronic) | 978-1-5090-3205-1 |
| DOIs | |
| Publication status | Published - 9 Feb 2017 |
Cite this
- APA
- Author
- BIBTEX
- Harvard
- Standard
- RIS
- Vancouver