A Critical Comparison of Trusted Computing and Trust Management Technologies

被引:0
|
作者
Tomaiuolo, Michele [1 ]
机构
[1] Univ Parma, Dept Informat Engn, Parma, Italy
关键词
Authorization; Delegation; Digital Books; Information Access; Intellectual Property Rights; Multimedia; Security; Trust; Web Services;
D O I
10.4018/ijcwt.2014100105
中图分类号
D0 [政治学、政治理论];
学科分类号
0302 ; 030201 ;
摘要
Mainly justified by the growing concern about vulnerabilities of IT systems, some new technologies are being integrated into computing devices, for realizing so-called Trusted Computing systems. However; they are raising questions about intrusive cyber-control over individual user activities and data, but also about consequences in cyber-war scenarios. The aim of this article is to confront Trusted Computing systems with distributed Trust Management systems, which realize access control for local resources on the basis of delegation of access rights, according to local trust decisions. Both technologies are discussed from various points of view: architecture, vision, ethics, politics and law. Some experimentations are also presented, to show the applicability of Trust Management techniques to modem Service-Oriented Architectures.
引用
收藏
页码:64 / 81
页数:18
相关论文
共 50 条
  • [41] A formal method based on noninterference for analyzing trust chain of trusted computing platform
    Zhang X.
    Huang Q.
    Shen C.-X.
    Jisuanji Xuebao/Chinese Journal of Computers, 2010, 33 (01): : 74 - 81
  • [42] Distributed dynamic trust management model based on trusted domains
    Liu, Wenfen
    Dai, Zhiyong
    Gao, Yan
    Sichuan Daxue Xuebao (Gongcheng Kexue Ban)/Journal of Sichuan University (Engineering Science Edition), 2014, 46 (04): : 61 - 66
  • [43] Building User Trust of Critical Digital Technologies
    Given-Wilson, Thomas
    Baranov, Eduard
    Legay, Axel
    2020 IEEE INTERNATIONAL CONFERENCE ON INDUSTRIAL TECHNOLOGY (ICIT), 2020, : 1199 - 1204
  • [44] Trust management for pervasive computing environments
    Trček, Denis
    World Academy of Science, Engineering and Technology, 2010, 37 : 185 - 190
  • [45] Probabilistic Trust Management in Pervasive Computing
    Denko, Mieso K.
    Sun, Tao
    EUC 2008: PROCEEDINGS OF THE 5TH INTERNATIONAL CONFERENCE ON EMBEDDED AND UBIQUITOUS COMPUTING, VOL 2, WORKSHOPS, 2008, : 610 - 615
  • [46] Trust Management in the Pervasive Computing Era
    Trcek, Denis
    IEEE SECURITY & PRIVACY, 2011, 9 (04) : 52 - 55
  • [47] Trust Management in Cloud Computing: A Survey
    Monir, Merrihan B.
    AbdelAzi, Mohammed H.
    AbdelHamid, AbdelAziz A.
    El-Horbaty, El-Sayed M.
    2015 IEEE SEVENTH INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTING AND INFORMATION SYSTEMS (ICICIS), 2015, : 231 - 242
  • [48] A Trusted-based Cloud Computing Virtual Storage System and Key Technologies
    Wu, K. H.
    Chen, L.
    Li, Yi
    INTERNATIONAL JOURNAL OF COMPUTERS COMMUNICATIONS & CONTROL, 2015, 10 (04) : 579 - 592
  • [49] A security model to protect sensitive information flows based on trusted computing technologies
    Wang, Shi-Hua
    Li, Xiao-Yong
    PROCEEDINGS OF 2008 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-7, 2008, : 3646 - +
  • [50] A Way of Key Management in Cloud Storage Based on Trusted Computing
    Yang, Xin
    Shen, Qingni
    Yang, Yahui
    Qing, Sihan
    NETWORK AND PARALLEL COMPUTING, 2011, 6985 : 135 - 145