The Community for Technology Leaders
RSS Icon
Subscribe
Issue No.02 - March/April (2007 vol.5)
pp: 4-5
Fred Schneider , Associate Editor in Chief
ABSTRACT
The trusted computing technology embodied in the Trusted Platform Module secure-coprocessor from the Trusted Computing Group is a hardware-based root of trust that makes it possible for the system designer--not the computer owner--to regulate which programs can run on a given computer. If system designers are evil, then they can use trusted computing to prevent a competitors' programs from being installed, thus creating or preserving a monopoly. When computer owners are incompetent, though, benevolent system designers can use trusted computing to prevent malware from being installed and run.
INDEX TERMS
Trusted computing, Trusted Platform Module, Trusted Computing Group
CITATION
Fred Schneider, "Trusted Computing in Context", IEEE Security & Privacy, vol.5, no. 2, pp. 4-5, March/April 2007, doi:10.1109/MSP.2007.47
24 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool