skip to main content
10.1145/1244002.1244343acmconferencesArticle/Chapter ViewAbstractPublication PagessacConference Proceedingsconference-collections
Article

Designing a trust chain for a thin client on a live Linux cd

Published: 11 March 2007 Publication History

Abstract

CD-boot Linuxi is a live Linux environment, which is easy to use because it is not installed in the hard disk, but simply boots directly from a CD. This helps protect the sensitive information because a clean environment can be prepared at boot time. To insure this environment protects sensitive information, we adapted the trusted computing technology to define a trustworthy environment.

References

[1]
Trusted Computing Group (TCG), http://www.trustedcomputinggroup.org/
[2]
Knoppix, http://www.knopper.net/knoppix/index-en.html
[3]
R. Sailer, et. al. Design and Implementation of a TCG-based Integrity Measurement Architecture. USENIX Security Symposium 2004, pp.223--238.
[4]
H. Maruyama, et. al. Trusted Platform on Demand, IBM Research Report RT0564, February 1, 2004.

Cited By

View all
  • (2012)Security challenges in IT infrastructure for cybersecurity curriculum supportProceedings of the 40th annual ACM SIGUCCS conference on User services10.1145/2382456.2382499(175-180)Online publication date: 15-Oct-2012
  • (2010)Trusted computing based microkernel2010 International Conference on Computer Applications and Industrial Electronics10.1109/ICCAIE.2010.5771164(1-4)Online publication date: Dec-2010
  • (2009)A New Approach to Protect the OS from Off-line Attacks Using the Smart CardProceedings of the 2009 Third International Conference on Emerging Security Information, Systems and Technologies10.1109/SECURWARE.2009.57(185-190)Online publication date: 18-Jun-2009
  • Show More Cited By

Index Terms

  1. Designing a trust chain for a thin client on a live Linux cd

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    SAC '07: Proceedings of the 2007 ACM symposium on Applied computing
    March 2007
    1688 pages
    ISBN:1595934804
    DOI:10.1145/1244002
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 11 March 2007

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. thin client
    2. trusted computing

    Qualifiers

    • Article

    Conference

    SAC07
    Sponsor:

    Acceptance Rates

    Overall Acceptance Rate 1,650 of 6,669 submissions, 25%

    Upcoming Conference

    SAC '25
    The 40th ACM/SIGAPP Symposium on Applied Computing
    March 31 - April 4, 2025
    Catania , Italy

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)0
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 03 Mar 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2012)Security challenges in IT infrastructure for cybersecurity curriculum supportProceedings of the 40th annual ACM SIGUCCS conference on User services10.1145/2382456.2382499(175-180)Online publication date: 15-Oct-2012
    • (2010)Trusted computing based microkernel2010 International Conference on Computer Applications and Industrial Electronics10.1109/ICCAIE.2010.5771164(1-4)Online publication date: Dec-2010
    • (2009)A New Approach to Protect the OS from Off-line Attacks Using the Smart CardProceedings of the 2009 Third International Conference on Emerging Security Information, Systems and Technologies10.1109/SECURWARE.2009.57(185-190)Online publication date: 18-Jun-2009
    • (2009)A new high-performance approach for offline replacement attack prevention in trusted clients2009 IEEE 6th International Conference on Mobile Adhoc and Sensor Systems10.1109/MOBHOC.2009.5336927(741-746)Online publication date: Oct-2009
    • (2009)The Design of Mobile Service Platform Based on Asynchronous Message Control ModuleProceedings of the 2009 International Forum on Computer Science-Technology and Applications - Volume 0110.1109/IFCSTA.2009.81(310-314)Online publication date: 25-Dec-2009
    • (2008)A New Approach for Secure and Portable OSProceedings of the 2008 Second International Conference on Emerging Security Information, Systems and Technologies10.1109/SECURWARE.2008.34(28-33)Online publication date: 25-Aug-2008

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media