Nothing Special   »   [go: up one dir, main page]

skip to main content
opinion

Trusted Computing in Context

Published: 01 March 2007 Publication History

Abstract

The trusted computing technology embodied in the Trusted Platform Modulesecure-coprocessor from the Trusted Computing Group is a hardware-based root of trust thatmakes it possible for the system designer--not the computer owner--to regulate whichprograms can run on a given computer. If system designers are evil, then they can usetrusted computing to prevent a competitors' programs from being installed, thus creating orpreserving a monopoly. When computer owners are incompetent, though, benevolent system designers can use trusted computing to prevent malware from being installed and run.

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image IEEE Security and Privacy
IEEE Security and Privacy  Volume 5, Issue 2
March 2007
92 pages

Publisher

IEEE Educational Activities Department

United States

Publication History

Published: 01 March 2007

Author Tags

  1. Trusted Computing Group
  2. Trusted Platform Module
  3. Trusted computing

Qualifiers

  • Opinion

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • 0
    Total Citations
  • 0
    Total Downloads
  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 09 Dec 2024

Other Metrics

Citations

View Options

View options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media