Issue No. 06 - November/December (2009 vol. 7)
DOI Bookmark: http://doi.ieeecomputersociety.org/10.1109/MSP.2009.156
Bruce Potter , The Shmoo Group
Attacks on computer systems are increasing in number and seriousness. One way to deal with this threat is to create systems that support trusted computing—having a high degree of trust that the computer is behaving as you expect and only as you expect. Effective implementation of this concept will give us more assurance in the systems we use and ultimately more trust in the transactions we make on the Internet.
trusted computing, Trusted Platform Module, TPM, high-assurance computing, malware protection, trust, security & privacy, it all depends
B. Potter, "High Time for Trusted Computing," in IEEE Security & Privacy, vol. 7, no. , pp. 54-56, 2009.