Roots of Trust

0Citations
Citations of this article
2Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Trust in any system needs a foundation or a root of trust. Here, we discuss the roots of trust that have been proposed or deployed. Typically, the root of trust is based on the secrecy of a private key that is embedded in hardware; the corresponding public key is certified by the hardware’s manufacturer. As we discuss, some systems further rely on a piece of code that must execute in the early boot process for their root of trust.We also discuss schemes where the root of trust is established by the properties of the physical hardware itself.

Cite

CITATION STYLE

APA

Parno, B., McCune, J. M., & Perrig, A. (2011). Roots of Trust. In SpringerBriefs in Computer Science (Vol. 10, pp. 35–40). Springer. https://doi.org/10.1007/978-1-4614-1460-5_6

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free