www.isg.rhul.ac.uk

Trusted Computing Research in the ISG

Introduction

The purpose of this page is to summarise the contributions of the Royal Holloway ISG in the area of trusted computing.

Principals

The following individuals have participated in trusted computing research at Royal Holloway.

Projects and events

The ISG has participated in a number of research projects relating to Trusted Computing.

Completed trusted computing related projects include the following.

The ISG hosted the 5th European Trusted Infrastructure Summer School (ETISS 2010) on 5th-10th September 2010. This event was open to all researchers in IT security who are keen to learn more about trusted infrastructure. Further details can be found at the event web site.

Publications

2012

C. Chen, C. J. Mitchell and S. Tang, ' Building general purpose security services on trusted computing', in: L. Chen, M. Yung and L. Zhu (eds.), Trusted Systems - Third International Conference, INTRUST 2011, Beijing, China, November 27-29, 2011, Revised Selected Papers, Springer-Verlag LNCS 7222, Berlin (2012), pp.16-31.

C. J. Mitchell and A. Tomlinson (editors), Trusted Systems: Fourth International Conference, InTrust 2012, Royal Holloway, University of London, United Kingdom, December 17-18, 2012, Proceedings (Springer, Lecture Notes in Computer Science 7711, to appear).

2010

C. Gebhardt and A. Tomlinson, Challenges for Inter Virtual Machine Communication, Department of Mathematics, Royal Holloway, University of London Technical Report RHUL-MA-2010-12, September 2010.

C. Gebhardt, C. Dalton and A. Tomlinson, 'Separating Hypervisor Trusted Computing Base Supported by Hardware ', in: Proceedings of STC 10, the Fifth Annual Workshop on Scalable Trusted Computing, Hyatt Regency Chicago, Chicago, Illinois, USA, October 2010, ACM, 2010.

2009

L. Chen, C. J. Mitchell and A. Martin (editors), Trusted Computing, Second International Conference, Trust 2009, Oxford, UK, April 6-8, 2009, Proceedings (Springer, Lecture Notes in Computer Science 5471, 2009), 263 pages.

E. Gallery, A. Nagarajan and V. Varadharajan, 'A property-dependent agent transfer protocol', in: L. Chen, C. J. Mitchell and A. Martin (eds.), Trusted Computing, Second International Conference, Trust 2009, Oxford, UK, April 6-8, 2009, Proceedings, Springer-Verlag LNCS 5471, Berlin (2009), pp.240-263.

E. M. Gallery and C. J. Mitchell, 'Trusted computing: Security and applications', Cryptologia, 33 (2009) 217-245.

C. Gebhardt and C. I. Dalton, 'LaLa: A Late Launch Application', in: Proc. 4th Annual Workshop on Scalable Trusted Computing, Chicago, IL, November 2009, ACM Press (2009).

A. Leung, P.-W. Yau and C. J. Mitchell, 'Using trusted computing to secure mobile ubiquitous environments', in: Security and Privacy in Wireless and Mobile Networking (Troubador Publishing, 2009), edited by S. Gritzalis, T. Karygiannis and C. Skianis, pp.303-335.

P. Yau and A. Tomlinson, 'Enhancing Grid Security using Workflows, Trusted Computing and Virtualisation', in: Proceedings of the 2009 International Conference on Grid Computing and Applications (GCA 2009), Worldcomp '09, Las Vegas, Nevada, USA, July 13-16, 2009, CSREA Press (2009), pp.113-119

2008

M. Alawneh and I. Abbadi, 'Combining DRM with Trusted Computing for Effective Information Access Management', in: Proceedings of PTITS '08, the 2nd Workshop on Practice and Theory of IT Security, Montreal, Canada, January 2008, IEEE Computer Society (2008).

M. Alawneh and I. Abbadi, 'Software Licence Protection and Management for Organisations', in: Proceedings of SEC 2008, the 23rd International Information Security Conference, Milan, Italy, September 2008, Springer-Verlag (LNCS), Berlin (2008).

S. Balfe, E. Gallery, C. J. Mitchell and K. G. Paterson, 'Crimeware and trusted computing', Chapter 15 of Crimeware: Understanding New Attacks and Defenses (Addison-Wesley, 2008), edited by M. Jakobsson and Z. Ramzan, pp.457-472.

S. Balfe, E. Gallery, C. J. Mitchell and K. G. Paterson, 'Challenges for trusted computing', IEEE Security and Privacy, IEEE Security and Privacy, 6 no. 6 (November/December 2008) 60-66.

S. Balfe, E. Gallery, C. J. Mitchell and K. G. Paterson, 'Challenges for Trusted Computing', Department of Mathematics, Royal Holloway, University of London Technical Report RHUL-MA-2008-14, February 2008.

S. Balfe and K. G. Paterson, 'Augmenting Internet-based Card-not-present Transactions with Trusted Computing: An Analysis', in: G. Tsudik (ed.), Financial Cryptography 2008, Springer-Verlag LNCS 5143, Berlin (2008), pp.171-175.

S. Balfe and K. G. Paterson, 'e-EMV: Emulating EMV for Internet Payments with Trusted Computing Technologies', in: S. Xu, C. Nita-Rotaru, J.-P. Seifert (eds.), Proceedings of the 3rd ACM Workshop on Scalable Trusted Computing (STC 2008), ACM (2008_, pp. 81-92.

C. Gebhardt, C. I. Dalton, and R. Brown, 'Preventing hypervisor-based rootkits with trusted execution technology', Elsevier Network Security Newsletter, 11 (November 2008), pp.7-11.

C. Gebhardt and A. Tomlinson, 'Secure Virtual Disk Images for Grid Computing', in: 3rd Asia-Pacific Trusted Infrastructure Technologies Conference (APTC 2008). IEEE Computer Society, October 2008.

C. Gebhardt and A. Tomlinson, 'Trusted Virtual Disk Images', in: 2nd Conference on the Future of Trust in Computing, Berlin, July 2008. Vieweg & Teubner.

C. Gebhardt and A. Tomlinson, 'Security consideration for virtualization', Department of Mathematics, Royal Holloway, University of London Technical Report RHUL-MA-2008-16, 2008.

A. Leung, 'Mobile device management framework for secure service delivery', Information Security Technical Report, 13 no. 3 (2008) 118-126.

A. Leung, L. Chen and C. J. Mitchell, 'On a possible privacy flaw in Direct Anonymous Attestation (DAA)', in: P. Lipp, A.-R. Sadeghi and K.-M. Koch (eds.), Trusted Computing - Challenges and Applications, First International Conference on Trusted Computing and Trust in Information Technologies, TRUST 2008, Villach, Austria, March 11-12, 2008, Proceedings, Springer-Verlag LNCS 4968, Berlin (2008), pp.179-190. [See also: Royal Holloway, University of London, Mathematics Department Technical Report RHUL-MA-2007-10, December 2007].

A. Leung and C. J. Mitchell, 'A Device Management Framework for Secure Ubiquitous Services Delivery' in: Proceedings: the Fourth International Symposium on Information Assurance and Security (IAS 2008), Naples, Italy, September 2008, IEEE Computer Society Press, Los Alamitos, CA (2008), pp.267-274.

F. Stumpf, C. Eckert and S. Balfe, 'Towards secure e-Commerce based on virtualization and attestation techniques', in: Proceedings of the The Third International Conference on Availability, Reliability and Security, ARES 2008, March 4-7, 2008, Technical University of Catalonia, Barcelona, Spain, IEEE Computer Society Press (2008), pp.376-382.

R. Toegl, G. Hofferek, K. Greimel, A. Leung, R. C.-W. Phan and R. Bloem, 'Formal analysis of a TPM-based secrets distribution and storage scheme', in: Proceedings of the 2008 International Symposium on Trusted Computing (TrustCom 2008), Hunan, China, November 18-21, 2008, IEEE Computer Society (2008), pp.2289-2294.

A. Tomlinson, 'Introduction to the TPM', in: Smart Cards, Tokens, Security and Applications', pp.155-172. Springer, 2008.

P.-W. Yau, A. Tomlinson, S. Balfe and E. Gallery, 'Securing grid workflows with trusted computing (extended abstract)', in: International Conference on Computational Science (ICCS 2008): Applications of Workflows in Computational Science, Krakow, Poland, 23-25 June, 2008, IEEE Computer Society Press (2008), p.700.

P.-W. Yau, A. Tomlinson, S. Balfe and E. Gallery, 'Securing grid workflows with trusted computing', in: M. Bubak, G. D. van Albada, J. Dongarra, and P. M. A. Sloot (eds.), Proc. International Conference on Computational Science (ICCS 2008): Applications of Workflows in Computational Science, Krakow, Poland, 23-25 June, 2008, Springer-Verlag LNCS 5103, Berlin (2008), pp.510-519.

2007

I. Abbadi, 'Authorised Domain Management using Location Based Services', in: Proceedings of Mobility '07, 4th International Conference on Mobile Technology, Applications and Systems, Singapore, September 2007, ACM Press (2007), pp.288-295.

I. Abbadi, 'Digital Rights Management Using a Master Control Device', in: Proceedings of ASIAN '07, 12th Annual Asian Computing Science Conference Focusing on Computer and Network Security, Doha-Qatar, December 2007, Springer-Verlag (LNCS 4846), Berlin (2007), pp.126-141.

I. Abbadi and C. J. Mitchell, 'Digital rights management using a mobile phone', in: Proceedings of ICEC 2007, Ninth International Conference on Electronic Commerce, Minneapolis, USA, August 2007, ACM Press (2007), pp.185-194.

S. Balfe and E. Gallery, 'Mobile Agents and the Deus Ex Machina', in Proceedings of UBISAFE 2007, the 2007 IEEE International Symposium on Ubisafe Computing, May 2007, Niagara Falls, Ontario, Canada.

S. Balfe and A. Mohammed, 'Final Fantasy - Securing On-line Gaming with Trusted Computing', in: Proceedings of ATC-07, the 4th International Conference on Autonomic and Trusted Computing, Hong Kong, July 2007.

E. Gallery, 'Authorisation Issues for Mobile Code in Mobile Systems', Department of Mathematics, Royal Holloway, University of London Technical Report RHUL-MA-2007-3, May 2007.

E. Gallery and C. J. Mitchell, 'Trusted mobile platforms', in: A. Aldini and R. Gorrieri (eds.), Foundations of Security Analysis and Design IV: FOSAD 2006/2007 Tutorial Lectures, Springer-Verlag LNCS 4677, Berlin (2007), pp.282-323.

A. Leung and C. J. Mitchell, 'Ninja: Non Identity Based, Privacy Preserving Authentication for Ubiquitous Environments', in: J. Krumm, G. D. Abowd, A. Seneviratne and T. Strang (eds.), UbiComp 2007: Ubiquitous Computing, 9th International Conference, Innsbruck, Austria, September 16--19 2007, Springer-Verlag LNCS 4717, Berlin (2007), pp.73-90.

A. Leung and G. S. Poh, 'An Anonymous Watermarking Scheme for Content Distribution Protection using Trusted Computing, in: Proceedings of the International Conference on Security and Cryptography (SECRYPT 2007), Barcelona, Spain, August 28-31, 2007, INSTICC Press, pp.319-326.

A. Martin and P.-W. Yau, 'Grid Security: Next Steps', Information Security Technical Report, 12 no. 3 (2007) 113-122.

P.-W. Yau and A. Tomlinson, 'Using Trusted Computing in Commercial Grids, in: B. Akhgar, editor, Proceedings of the 15th International Workshops on Conceptual Structures(ICCS 2007), Sheffield, UK, July 22-27, 2007, pp.31-36. Springer-Verlag, July 2007.

2006

A. Alsaid and C. J. Mitchell, 'Preventing phishing attacks using trusted computing technology', in Proceedings of INC 2006, Sixth International Network Conference, Plymouth, UK, July 2006, pp.221-228.

S. Balfe, S. Li and J. Zhou, 'Pervasive Trusted Computing', in: Proceedings of the 2nd International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing, Lyon, France, June 2006.

S. Balfe and K. G. Paterson, 'e-EMV: Emulating EMV for Internet payments using Trusted Computing technology', Technical Report RHUL-MA-2006-10 v2, Department of Mathematics, Royal Holloway, University of London, November 2006.

E. M. Gallery and C. J. Mitchell, 'Trusted computing technologies and their use in the provision of high assurance SDR platforms', in: Proc. of 2006 Software Defined Radio Technical Conference, Orlando, Florida, November 2006.

S. Li, S. Balfe, J. Zhou and K. Chen, 'Enforcing Trust in Pervasive Computing with Trusted Computing Technology', in: Proceedings of CRITIS '06, Proceedings of 2006 International Workshop on Critical Information Infrastructures Security, Samos Island, Greece, August 2006, Lecture Notes in Computer Science, Springer, 2006.

C. J. Mitchell, 'Mobile security and trusted computing', it - Information Technology, 48 (2006) 321-326.

2005

S. Balfe, A. D. Lakhani and K. G. Paterson, 'Securing peer-to-peer networks using trusted computing', In C. J. Mitchell (ed.), Trusted Computing, IEE Press, 2005, pp.271-298.

S. Balfe, A. D. Lakhani and K. G. Paterson, 'Trusted Computing: Providing security for Peer-to-Peer Networks', in: G. Caronni et al., Proc. Fifth International Conference on Peer-to-Peer Computing, IEEE Computer Society, 2005, pp.117-124.

A. W. Dent and G. Price, 'Certificate management using distributed trusted third parties', in: C. J. Mitchell (ed.), Trusted Computing, IEE Press, 2005, pp.251-270.

A. Gajparia and C. J. Mitchell, 'Enhancing user privacy using trusted computing', in: C. J. Mitchell (ed.), Trusted Computing, IEE Press, 2005, pp.239-250.

E. Gallery, 'An overview of trusted computing technology', in: C. J. Mitchell (ed.), Trusted Computing, IEE Press, 2005, pp.29-114.

E. Gallery and A. Tomlinson, 'Secure delivery of conditional access applications to mobile receivers', in: C. J. Mitchell (ed.), Trusted Computing, IEE Press, 2005, pp.195-237.

E. Gallery and A. Tomlinson, 'Protection of Downloadable Software on SDR Devices', in: Software Defined Radio Technical Conference SDR05, November 2005.

E. Gallery, A. Tomlinson and R. Delicata, 'Application of Trusted Computing to Secure Video Broadcasts to Mobile Receivers', Technical Report RHUL-MA-2005-11, Department of Mathematics, Royal Holloway, University of London, June 2005.

C. J. Mitchell (editor), Trusted Computing (IEE, London, 2005), 313 pages.

C. J. Mitchell, 'What is trusted computing?', in: C. J. Mitchell (ed.), Trusted Computing, IEE Press, 2005, pp.1-10.

A. Pashalidis and C. J. Mitchell, 'Single sign-on using TCG-conformant platforms', in: C. J. Mitchell (ed.), Trusted Computing, IEE Press, 2005, pp.175-193.

2003

A. Pashalidis and C. J. Mitchell, 'Single sign-on using trusted platforms', in: C. Boyd and W. Mao (eds.) Information Security, 6th International Conference, ISC 2003, Bristol, UK, October 2003, Proceedings, Springer-Verlag (LNCS 2851), Berlin (2003), pp.54-68. [See also: Royal Holloway, University of London, Mathematics Department Technical Report RHUL-MA-2003-3, March 2003, 15 pages].

Other links