• DocumentCode
    758901
  • Title

    Trusted Computing in Context

  • Author

    Schneider, Fred

  • Author_Institution
    Associate Editor in Chief
  • Volume
    5
  • Issue
    2
  • fYear
    2007
  • Firstpage
    4
  • Lastpage
    5
  • Abstract
    The trusted computing technology embodied in the Trusted Platform Module secure-coprocessor from the Trusted Computing Group is a hardware-based root of trust that makes it possible for the system designer--not the computer owner--to regulate which programs can run on a given computer. If system designers are evil, then they can use trusted computing to prevent a competitors´ programs from being installed, thus creating or preserving a monopoly. When computer owners are incompetent, though, benevolent system designers can use trusted computing to prevent malware from being installed and run.
  • Keywords
    Computer networks; Computer science; Computer security; Digital audio broadcasting; Diseases; Education; Information security; Information technology; Privacy; Silver; Trusted Computing Group; Trusted Platform Module; Trusted computing;
  • fLanguage
    English
  • Journal_Title
    Security & Privacy, IEEE
  • Publisher
    ieee
  • ISSN
    1540-7993
  • Type

    jour

  • DOI
    10.1109/MSP.2007.47
  • Filename
    4140981