DocumentCode
836040
Title
The trusted PC: skin-deep security
Author
Huang, Andrew Bunnie
Author_Institution
Xenatera Partners, San Diego, CA, USA
Volume
35
Issue
10
fYear
2002
fDate
10/1/2002 12:00:00 AM
Firstpage
103
Lastpage
105
Abstract
Current efforts to secure the PCs traditionally open architecture will give consumers two unattractive choices: They will either have to pay a huge premium for an unwieldy system that employs impenetrable membranes, encrypted buses, and tamper-resistant memory, or they will have to settle for an inferior solution that fails to thwart dishonest users and limits the ability to backup data and interoperate with third-party software. Investing in proven architectural improvements such as guarded pointers and data tags is a more cost-effective and long-overdue alternative.
Keywords
IBM compatible machines; security of data; Palladium; Trusted Computing Platform Alliance; Xbox; authentication infrastructure; data tags; guarded pointers; hardware security; interoperability; open architecture; power-on initialization procedures; schizophrenic basic input/output system; trust relationship; trusted PC architecture; Application software; Authentication; Computer security; Cryptography; Field programmable gate arrays; Hardware; Microcomputers; Operating systems; Proposals; Unsolicited electronic mail;
fLanguage
English
Journal_Title
Computer
Publisher
ieee
ISSN
0018-9162
Type
jour
DOI
10.1109/MC.2002.1039525
Filename
1039525
Link To Document