This Article 
   
 Share 
   
 Bibliographic References 
   
 Add to: 
 
Digg
Furl
Spurl
Blink
Simpy
Google
Del.icio.us
Y!MyWeb
 
 Search 
   
March/April 2007 (vol. 5 no. 2)
pp. 4-5
Fred Schneider, Associate Editor in Chief
The trusted computing technology embodied in the Trusted Platform Module secure-coprocessor from the Trusted Computing Group is a hardware-based root of trust that makes it possible for the system designer--not the computer owner--to regulate which programs can run on a given computer. If system designers are evil, then they can use trusted computing to prevent a competitors' programs from being installed, thus creating or preserving a monopoly. When computer owners are incompetent, though, benevolent system designers can use trusted computing to prevent malware from being installed and run.
Index Terms:
Trusted computing, Trusted Platform Module, Trusted Computing Group
Citation:
Fred Schneider, "Trusted Computing in Context," IEEE Security & Privacy, vol. 5, no. 2, pp. 4-5, March-April 2007, doi:10.1109/MSP.2007.47
Usage of this product signifies your acceptance of the Terms of Use.