Trusted Mobile Computing

Mobility leads to unplanned interactions between computer systems as people use devices to access services in varied environments. Before two systems agree to interact, they must trust that each will satisfy the security and privacy requirements of the other. In this paper, we introduce trust overlays, a systematic approach to building such trust. Our solution exploits the increasing availability of trusted computing hardware on commodity systems, including portable computers. We argue that key pieces of this solution are coming into place, for example ways to dynamically establish a distributed trusted computing base. We also point out that difficult challenges remain, for example how to set compatible security policies across administrative domains.

By: Ramón Cáceres; Reiner Sailer

Published in: RC23752 in 2005

LIMITED DISTRIBUTION NOTICE:

This Research Report is available. This report has been submitted for publication outside of IBM and will probably be copyrighted if accepted for publication. It has been issued as a Research Report for early dissemination of its contents. In view of the transfer of copyright to the outside publisher, its distribution outside of IBM prior to publication should be limited to peer communications and specific requests. After outside publication, requests should be filled only by reprints or legally obtained copies of the article (e.g., payment of royalties). I have read and understand this notice and am a member of the scientific community outside or inside of IBM seeking a single copy only.

rc23752.pdf

Questions about this service can be mailed to reports@us.ibm.com .