TY - GEN
T1 - KISS
T2 - 6th International Conference on Trust and Trustworthy Computing, TRUST 2013
AU - Zhou, Zongwei
AU - Han, Jun
AU - Lin, Yue Hsun
AU - Perrig, Adrian
AU - Gligor, Virgil
PY - 2013
Y1 - 2013
N2 - Deploying a corporate key management system faces fundamental challenges, such as fine-grained key usage control and secure system administration. None of the current commercial systems (either based on software or hardware security modules) or research proposals adequately address both challenges with small and simple Trusted Computing Base (TCB). This paper presents a new key management architecture, called KISS, to enable comprehensive, trustworthy, user-verifiable, and cost-effective key management. KISS protects the entire life cycle of cryptographic keys. In particular, KISS allows only authorized applications and/or users to use the keys. Using simple devices, administrators can remotely issue authenticated commands to KISS and verify system output. KISS leverages readily available commodity hardware and trusted computing primitives to design system bootstrap protocols and management mechanisms, which protects the system from malware attacks and insider attacks.
AB - Deploying a corporate key management system faces fundamental challenges, such as fine-grained key usage control and secure system administration. None of the current commercial systems (either based on software or hardware security modules) or research proposals adequately address both challenges with small and simple Trusted Computing Base (TCB). This paper presents a new key management architecture, called KISS, to enable comprehensive, trustworthy, user-verifiable, and cost-effective key management. KISS protects the entire life cycle of cryptographic keys. In particular, KISS allows only authorized applications and/or users to use the keys. Using simple devices, administrators can remotely issue authenticated commands to KISS and verify system output. KISS leverages readily available commodity hardware and trusted computing primitives to design system bootstrap protocols and management mechanisms, which protects the system from malware attacks and insider attacks.
UR - http://www.scopus.com/inward/record.url?scp=84884658327&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84884658327&partnerID=8YFLogxK
U2 - 10.1007/978-3-642-38908-5_1
DO - 10.1007/978-3-642-38908-5_1
M3 - Conference contribution
AN - SCOPUS:84884658327
SN - 9783642389078
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 1
EP - 18
BT - Trust and Trustworthy Computing - 6th International Conference, TRUST 2013, Proceedings
Y2 - 17 June 2013 through 19 June 2013
ER -