322Accesses
Synonyms
Related Concepts
Definition
The termattestation has come to refer to a set of techniques to provide the relying party with sufficient evidence to make a trust decision about a given computing platform.
Background
In many scenarios in computing, a party may have motivation to ascertain the properties of another computing entity.
Probably the most natural scenarios arise in distributed computing. Can Alice trust that Bob’s remote server is sufficiently trustworthy for her to submit her sensitive information? Can Bob trust that Alice’s client machine is configured with the latest patches – or is it laden with malware that will infect his system if she connects? The problems can also arise in settings where this no clear client-server distinction, such as peer-to-peer computing (is Bob really running the bona fide file sharing client?).
The problem can also rise in more localized settings, where one of the parties...
This is a preview of subscription content,log in via an institution to check access.
Access this chapter
Subscribe and save
- Get 10 units per month
- Download Article/Chapter or eBook
- 1 Unit = 1 Article or 1 Chapter
- Cancel anytime
Buy Now
- Chapter
- JPY 3498
- Price includes VAT (Japan)
- eBook
- JPY 100099
- Price includes VAT (Japan)
Tax calculation will be finalised at checkout
Purchases are for personal use only
Recommended Reading
Smith SW (2005) Trusted Computing Platforms: Design and Applications, Chap. 10. Springer, New York
Smith SW (2004) Outbound authentication for programmable secure coprocessors. Int J Inform Sec 3(1):28–41
Author information
Authors and Affiliations
Department of Computer Science, Dartmouth College, 6211 Sudikoff Laboratory, 03755-3510, Hanover, NH, USA
Sean W. Smith
- Sean W. Smith
You can also search for this author inPubMed Google Scholar
Editor information
Editors and Affiliations
Department of Mathematics and Computing Science, Eindhoven University of Technology, 5600 MB, Eindhoven, The Netherlands
Henk C. A. van Tilborg
Center for Secure Information Systems, George Mason University, Fairfax, VA, 22030-4422, USA
Sushil Jajodia
Rights and permissions
Copyright information
© 2011 Springer Science+Business Media, LLC
About this entry
Cite this entry
Smith, S.W. (2011). Attestation. In: van Tilborg, H.C.A., Jajodia, S. (eds) Encyclopedia of Cryptography and Security. Springer, Boston, MA. https://doi.org/10.1007/978-1-4419-5906-5_697
Download citation
Publisher Name:Springer, Boston, MA
Print ISBN:978-1-4419-5905-8
Online ISBN:978-1-4419-5906-5
eBook Packages:Computer ScienceReference Module Computer Science and Engineering
Share this entry
Anyone you share the following link with will be able to read this content:
Sorry, a shareable link is not currently available for this article.
Provided by the Springer Nature SharedIt content-sharing initiative