This Article 
   
 Share 
   
 Bibliographic References 
   
 Add to: 
 
Digg
Furl
Spurl
Blink
Simpy
Google
Del.icio.us
Y!MyWeb
 
 Search 
   
High Time for Trusted Computing
November/December 2009 (vol. 7 no. 6)
pp. 54-56
Bruce Potter, The Shmoo Group
Attacks on computer systems are increasing in number and seriousness. One way to deal with this threat is to create systems that support trusted computing—having a high degree of trust that the computer is behaving as you expect and only as you expect. Effective implementation of this concept will give us more assurance in the systems we use and ultimately more trust in the transactions we make on the Internet.

1. M. Fitzgerald, "Organized Cybercrime Revealed," CSO Online,28 Sept. 2009; www.csoonline.com/article/503308Organized_Cybercrime_Revealed .
2. N. Provos et al., "All Your iFRAMEs Point to Us," Proc. 17th Usenix Security Symp., Usenix Assoc., 2008, pp. 1–15; www.usenix.org/events/sec08/techprovos.html .
3. B. Lampson, "Protection," , Proc. 5th Princeton Conf. Information Sciences and Systems, Princeton Univ. Press, 1971. Reprinted in ACM Operating Systems Rev., vol. 8, no. 1, 1974, pp. 18–24; http://research.microsoft.com/en-us/um/people/ blampson/08-ProtectionWebPage.html .
4. J.P. Anderson, Computer Security Technology Planning Study, Vol. II, ESD-TR-73-51, Electronic Systems Division, Air Force Systems Command, 1972; http://seclab.cs.ucdavis.edu/projects/history/ papersande72.pdf.

Index Terms:
trusted computing, Trusted Platform Module, TPM, high-assurance computing, malware protection, trust, security & privacy, it all depends
Citation:
Bruce Potter, "High Time for Trusted Computing," IEEE Security & Privacy, vol. 7, no. 6, pp. 54-56, Nov.-Dec. 2009, doi:10.1109/MSP.2009.156
Usage of this product signifies your acceptance of the Terms of Use.