Issue No. 02 - March/April (2007 vol. 5)
DOI Bookmark: http://doi.ieeecomputersociety.org/10.1109/MSP.2007.47
Fred Schneider , Associate Editor in Chief
The trusted computing technology embodied in the Trusted Platform Module secure-coprocessor from the Trusted Computing Group is a hardware-based root of trust that makes it possible for the system designer--not the computer owner--to regulate which programs can run on a given computer. If system designers are evil, then they can use trusted computing to prevent a competitors' programs from being installed, thus creating or preserving a monopoly. When computer owners are incompetent, though, benevolent system designers can use trusted computing to prevent malware from being installed and run.
Trusted computing, Trusted Platform Module, Trusted Computing Group
Fred Schneider, "Trusted Computing in Context", IEEE Security & Privacy, vol. 5, no. , pp. 4-5, March/April 2007, doi:10.1109/MSP.2007.47