Issue No.06 - November/December (2009 vol.7)
Bruce Potter , The Shmoo Group
DOI Bookmark: http://doi.ieeecomputersociety.org/10.1109/MSP.2009.156
Attacks on computer systems are increasing in number and seriousness. One way to deal with this threat is to create systems that support trusted computing—having a high degree of trust that the computer is behaving as you expect and only as you expect. Effective implementation of this concept will give us more assurance in the systems we use and ultimately more trust in the transactions we make on the Internet.
trusted computing, Trusted Platform Module, TPM, high-assurance computing, malware protection, trust, security & privacy, it all depends
Bruce Potter, "High Time for Trusted Computing", IEEE Security & Privacy, vol.7, no. 6, pp. 54-56, November/December 2009, doi:10.1109/MSP.2009.156