The Community for Technology Leaders
RSS Icon
Subscribe
Issue No.06 - November/December (2009 vol.7)
pp: 54-56
Bruce Potter , The Shmoo Group
ABSTRACT
Attacks on computer systems are increasing in number and seriousness. One way to deal with this threat is to create systems that support trusted computing—having a high degree of trust that the computer is behaving as you expect and only as you expect. Effective implementation of this concept will give us more assurance in the systems we use and ultimately more trust in the transactions we make on the Internet.
INDEX TERMS
trusted computing, Trusted Platform Module, TPM, high-assurance computing, malware protection, trust, security & privacy, it all depends
CITATION
Bruce Potter, "High Time for Trusted Computing", IEEE Security & Privacy, vol.7, no. 6, pp. 54-56, November/December 2009, doi:10.1109/MSP.2009.156
REFERENCES
1. M. Fitzgerald, "Organized Cybercrime Revealed," CSO Online,28 Sept. 2009; www.csoonline.com/article/503308Organized_Cybercrime_Revealed .
2. N. Provos et al., "All Your iFRAMEs Point to Us," Proc. 17th Usenix Security Symp., Usenix Assoc., 2008, pp. 1–15; www.usenix.org/events/sec08/techprovos.html .
3. B. Lampson, "Protection," , Proc. 5th Princeton Conf. Information Sciences and Systems, Princeton Univ. Press, 1971. Reprinted in ACM Operating Systems Rev., vol. 8, no. 1, 1974, pp. 18–24; http://research.microsoft.com/en-us/um/people/ blampson/08-ProtectionWebPage.html .
4. J.P. Anderson, Computer Security Technology Planning Study, Vol. II, ESD-TR-73-51, Electronic Systems Division, Air Force Systems Command, 1972; http://seclab.cs.ucdavis.edu/projects/history/ papersande72.pdf.
27 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool