DocumentCode :
507895
Title :
Trusted computing - opportunities & risks
Author :
Awang, Nor Fatimah Bt
Author_Institution :
Dept. of Comput. Sci., Nat. Defense Univ. of Malaysia, Kuala Lumpur, Malaysia
fYear :
2009
fDate :
11-14 Nov. 2009
Firstpage :
1
Lastpage :
5
Abstract :
Computer security is undeniably important in IT era nowdays. Most computer users today are fighting for - either by battling viruses, spam, phishing or other malware, or by fending off schemes to compromise privacy and extract confidential information. With these worries in mind, the Trusted Computing Group (TCG) was established to develop specifications for trusted computing building blocks and software interfaces that could address the problems and aims to enhance security by using the transitive properties of trust. However, the implementation of this technology seems to have consequences for many people. At present, there is no standard mechanism for establishing trust in the trusted computing (TC) on a particular machine. The TC specification is not rigidly defined when it comes to implementation, leaving many open issues for research and development efforts. There are major issues, especially related to privacy. One big worry is the potential loss of anonymity and the threat of unwanted surveillance and even control. TC also affects areas other than purely technical ones. The capabilities of TC technology have legal as well as economic consequences. The main legal concerns are copyright, anti-trust law, data privacy law and digital rights management, the impact on which are not yet clear. This paper will discuss the TC in concept and study on the opportunities and risks of the system in existing computing system environment particularly related to security matters.
Keywords :
computer crime; computer viruses; copyright; data privacy; digital rights management; legislation; unsolicited e-mail; IT era; TC specification; antitrust law; computer security; computer virus; confidential information; copyright; data privacy law; digital rights management; information privacy; legal concern; malware; phishing; software interface; spam; system risk; transitive property; trusted computing; Computer crime; Computer interfaces; Computer security; Computer viruses; Data mining; Information security; Law; Legal factors; Privacy; Research and development; Trusted Computing; component; network; security;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Collaborative Computing: Networking, Applications and Worksharing, 2009. CollaborateCom 2009. 5th International Conference on
Conference_Location :
Washington, DC
Print_ISBN :
978-963-9799-76-9
Electronic_ISBN :
978-963-9799-76-9
Type :
conf
DOI :
10.4108/ICST.COLLABORATECOM2009.8402
Filename :
5363808
Link To Document :
بازگشت