Friday, July 01, 2005

 

New TLV presentation addresses secure computing needs

So far the TLV has focused on the software process particularly. Thanks to the work being done by the Open Voting Consortium on countermeasures for protecting against software based attack methods directly, the TLV work now recognizes the need for a secure computing system.

Essentially the TLV has worked at providing protection through verification and auditing. Now by including secure computing this allows proactive defenses during the voting process itself that can potential identify attacks as they occur. In addition by using open scripts, the opportunity for attacks is reduced by minimizing the window of opportunity for attackers.

Using a master control agent allows execution thread control and tracing of the execution path during the voting process. This is very similar to anti-virus technology where monitoring prevents rogue process takeover, and monitors the execution signature of processes to detect changes.

The new TLV primer presentation contains details and updates to reflect this enhanced set of protections.

http://drrw.net/backup/Trusted-Logic-Voting-Systems-with-EML40.pdf

Comments: Post a Comment

<< Home

This page is powered by Blogger. Isn't yours?

- visitors: