A Critical Comparison of Trusted Computing and Trust Management Technologies

被引:0
|
作者
Tomaiuolo, Michele [1 ]
机构
[1] Univ Parma, Dept Informat Engn, Parma, Italy
关键词
Authorization; Delegation; Digital Books; Information Access; Intellectual Property Rights; Multimedia; Security; Trust; Web Services;
D O I
10.4018/ijcwt.2014100105
中图分类号
D0 [政治学、政治理论];
学科分类号
0302 ; 030201 ;
摘要
Mainly justified by the growing concern about vulnerabilities of IT systems, some new technologies are being integrated into computing devices, for realizing so-called Trusted Computing systems. However; they are raising questions about intrusive cyber-control over individual user activities and data, but also about consequences in cyber-war scenarios. The aim of this article is to confront Trusted Computing systems with distributed Trust Management systems, which realize access control for local resources on the basis of delegation of access rights, according to local trust decisions. Both technologies are discussed from various points of view: architecture, vision, ethics, politics and law. Some experimentations are also presented, to show the applicability of Trust Management techniques to modem Service-Oriented Architectures.
引用
收藏
页码:64 / 81
页数:18
相关论文
共 50 条
  • [1] Trust Management for Trusted Computing Platforms in Web Services
    Nagarajan, Aarthi
    Varadharajan, Vijay
    Hitchens, Michael
    STC'07: PROCEEDINGS OF THE 2007 ACM WORKSHOP ON SCALABLE TRUSTED COMPUTING, 2007, : 58 - 62
  • [2] Trusted-Computing Technologies for the Protection of Critical Information Systems
    Lioy, Antonio
    Ramunno, Gianluca
    Vernizzi, Davide
    PROCEEDINGS OF THE INTERNATIONAL WORKSHOP ON COMPUTATIONAL INTELLIGENCE IN SECURITY FOR INFORMATION SYSTEMS CISIS 2008, 2009, 53 : 77 - 83
  • [3] Privacy Preserving of Trust Management Credentials Based on Trusted Computing
    Wu, Bin
    Feng, Dengguo
    Duan, Meijiao
    INFORMATION SECURITY PRACTICE AND EXPERIENCE, PROCEEDINGS, 2010, 6047 : 251 - 263
  • [4] Research of Mobile Agent Trust Management Model in Trusted Computing Environment
    Chen, Aili
    Wu, Xiaoping
    2010 6TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS NETWORKING AND MOBILE COMPUTING (WICOM), 2010,
  • [5] Trust Management for Mobile Agent System Based on Trusted Computing Platforms
    Shen, Zhidong
    Wu, Xiaoping
    Zhan, Jing
    2010 IEEE INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND INFORMATION SECURITY (WCNIS), VOL 1, 2010, : 717 - +
  • [6] The trust measurement scheme in trusted computing
    Zhang, Li-Qiang
    Zhang, Huan-Guo
    Zhang, Fan
    Beijing Gongye Daxue Xuebao/Journal of Beijing University of Technology, 2010, 36 (05): : 586 - 591
  • [7] Enforcing trust in pervasive computing with trusted computing technology
    Li, Shiqun
    Balfe, Shane
    Zhou, Jianying
    Chen, Kefei
    CRITICAL INFORMATION INFRASTRUCTURES SECURITY, 2006, 4347 : 195 - +
  • [8] A Secure Trust Model Based on Trusted Computing
    Yin Zhixi
    2009 INTERNATIONAL CONFERENCE ON E-BUSINESS AND INFORMATION SYSTEM SECURITY, VOLS 1 AND 2, 2009, : 170 - 176
  • [9] A Trust Model for Heterogeneous Trusted Computing Architectures
    Zhu, Lu
    Yu, Sheng
    Zhang, Xing
    NSWCTC 2009: INTERNATIONAL CONFERENCE ON NETWORKS SECURITY, WIRELESS COMMUNICATIONS AND TRUSTED COMPUTING, VOL 2, PROCEEDINGS, 2009, : 539 - +
  • [10] Trust Management in Fog/Edge Computing by means of Blockchain Technologies
    Cinque, Marcello
    Esposito, Christian
    Russo, Stefano
    IEEE 2018 INTERNATIONAL CONGRESS ON CYBERMATICS / 2018 IEEE CONFERENCES ON INTERNET OF THINGS, GREEN COMPUTING AND COMMUNICATIONS, CYBER, PHYSICAL AND SOCIAL COMPUTING, SMART DATA, BLOCKCHAIN, COMPUTER AND INFORMATION TECHNOLOGY, 2018, : 1433 - 1439