DocumentCode
758901
Title
Trusted Computing in Context
Author
Schneider, Fred
Author_Institution
Associate Editor in Chief
Volume
5
Issue
2
fYear
2007
Firstpage
4
Lastpage
5
Abstract
The trusted computing technology embodied in the Trusted Platform Module secure-coprocessor from the Trusted Computing Group is a hardware-based root of trust that makes it possible for the system designer--not the computer owner--to regulate which programs can run on a given computer. If system designers are evil, then they can use trusted computing to prevent a competitors´ programs from being installed, thus creating or preserving a monopoly. When computer owners are incompetent, though, benevolent system designers can use trusted computing to prevent malware from being installed and run.
Keywords
Computer networks; Computer science; Computer security; Digital audio broadcasting; Diseases; Education; Information security; Information technology; Privacy; Silver; Trusted Computing Group; Trusted Platform Module; Trusted computing;
fLanguage
English
Journal_Title
Security & Privacy, IEEE
Publisher
ieee
ISSN
1540-7993
Type
jour
DOI
10.1109/MSP.2007.47
Filename
4140981
Link To Document