A Critical Comparison of Trusted Computing and Trust Management Technologies

被引:0
|
作者
Tomaiuolo, Michele [1 ]
机构
[1] Univ Parma, Dept Informat Engn, Parma, Italy
关键词
Authorization; Delegation; Digital Books; Information Access; Intellectual Property Rights; Multimedia; Security; Trust; Web Services;
D O I
10.4018/ijcwt.2014100105
中图分类号
D0 [政治学、政治理论];
学科分类号
0302 ; 030201 ;
摘要
Mainly justified by the growing concern about vulnerabilities of IT systems, some new technologies are being integrated into computing devices, for realizing so-called Trusted Computing systems. However; they are raising questions about intrusive cyber-control over individual user activities and data, but also about consequences in cyber-war scenarios. The aim of this article is to confront Trusted Computing systems with distributed Trust Management systems, which realize access control for local resources on the basis of delegation of access rights, according to local trust decisions. Both technologies are discussed from various points of view: architecture, vision, ethics, politics and law. Some experimentations are also presented, to show the applicability of Trust Management techniques to modem Service-Oriented Architectures.
引用
收藏
页码:64 / 81
页数:18
相关论文
共 50 条
  • [31] In Search of Trust: 30 Years of Evolution of Trusted Computing and Hardware Security
    Vishik, Claire
    PROCEEDINGS OF THE 2023 WORKSHOP ON ATTACKS AND SOLUTIONS IN HARDWARE SECURITY, ASHES 2023, 2023, : 1 - 1
  • [32] Research on Behavior Trust Based on Bayesian Inference in Trusted Computing Networks
    Liu, Wei
    Ci, Linlin
    Liu, Liping
    2015 IEEE INTERNATIONAL CONFERENCE ON SMART CITY/SOCIALCOM/SUSTAINCOM (SMARTCITY), 2015, : 1134 - 1138
  • [33] Frontier technologies of trust computing and network security
    Xiang, Yang
    Al-Dubi, Ahmed
    Liu, Lei
    Chu, Xiaowen
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2015, 27 (12): : 2907 - 2909
  • [34] Trust Management in Cloud Computing
    Challagidad, Praveen S.
    Birje, Mahantesh N.
    PROCEEDINGS OF THE 2017 INTERNATIONAL CONFERENCE ON SMART TECHNOLOGIES FOR SMART NATION (SMARTTECHCON), 2017, : 295 - 298
  • [35] Trusted virtual machine management model for cloud computing
    Zhou, Zhen-Ji
    Wu, Li-Fa
    Hong, Zheng
    Lai, Hai-Guang
    Zheng, Cheng-Hui
    1600, Editorial Board of Journal on Communications (35): : 94 - 105
  • [36] Identity management and trusted interaction in Internet and mobile computing
    Josang, Audun
    IET INFORMATION SECURITY, 2014, 8 (02) : 67 - 79
  • [37] Enabling fairer Digital Rights Management with trusted computing
    Sadeghi, Ahmad-Reza
    Wolf, Marko
    Stueble, Christian
    Asokan, N.
    Ekberg, Jan-Erik
    INFORMATION SECURITY, PROCEEDINGS, 2007, 4779 : 53 - +
  • [38] TMS: Visual Monitoring of Trusted Platform Board for Trust Computing based on Web
    Seo, Se-Kwang
    Baek, Sung-Jin
    Lee, Chang-Wu
    Kim, Sung-Won
    Park, Sun-Mi
    Jeong, Young-Sik
    PROCEEDINGS OF THE 2009 FOURTH INTERNATIONAL CONFERENCE ON EMBEDDED AND MULTIMEDIA COMPUTING, 2009, : 67 - +
  • [39] Testing on trust chain of trusted computing platform based on labeled transition system
    Xu, Ming-Di
    Zhang, Huan-Guo
    Yan, Fei
    Jisuanji Xuebao/Chinese Journal of Computers, 2009, 32 (04): : 635 - 645
  • [40] Towards Improved Trust in Threat Intelligence Sharing using Blockchain and Trusted Computing
    Wu, Yichang
    Qiao, Yuansong
    Ye, Yuhang
    Lee, Brian
    2019 SIXTH INTERNATIONAL CONFERENCE ON INTERNET OF THINGS: SYSTEMS, MANAGEMENT AND SECURITY (IOTSMS), 2019, : 474 - 481