DocumentCode :
758901
Title :
Trusted Computing in Context
Author :
Schneider, Fred
Author_Institution :
Associate Editor in Chief
Volume :
5
Issue :
2
fYear :
2007
Firstpage :
4
Lastpage :
5
Abstract :
The trusted computing technology embodied in the Trusted Platform Module secure-coprocessor from the Trusted Computing Group is a hardware-based root of trust that makes it possible for the system designer--not the computer owner--to regulate which programs can run on a given computer. If system designers are evil, then they can use trusted computing to prevent a competitors´ programs from being installed, thus creating or preserving a monopoly. When computer owners are incompetent, though, benevolent system designers can use trusted computing to prevent malware from being installed and run.
Keywords :
Computer networks; Computer science; Computer security; Digital audio broadcasting; Diseases; Education; Information security; Information technology; Privacy; Silver; Trusted Computing Group; Trusted Platform Module; Trusted computing;
fLanguage :
English
Journal_Title :
Security & Privacy, IEEE
Publisher :
ieee
ISSN :
1540-7993
Type :
jour
DOI :
10.1109/MSP.2007.47
Filename :
4140981
Link To Document :
بازگشت