Privacy-enhancing uses of trusted platform technology

被引:0
|
作者
Pearson, S [1 ]
机构
[1] Hewlett Packard Labs, Bristol BS34 8QZ, Avon, England
关键词
trusted computer; e-commerce; privacy; control;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The problem of enhancing trust in e-commerce while maintaining privacy is an important one, not least because lack of such trust is a key inhibitor to the growth of e-commerce. This paper describes various applications for trusted computer technology ((www.trustedcomnuting.org) under bar) that promote privacy and freedom. Preferably, trusted hardware acts as a root of trust in this process; this approach is most appropriate in cases where the trusted infrastructure is already in place and therefore may be readily exploited in a practical and efficient manner. In other cases many of the techniques described may still be applied using a combination of some trusted infrastructure and alternative pseudonymous technology.
引用
收藏
页码:116 / 121
页数:6
相关论文
共 50 条
  • [1] PET-USES: Privacy-Enhancing Technology - Users' Self-Estimation Scale
    Wastlund, Erik
    Wolkerstorfer, Peter
    Koffel, Christina
    [J]. PRIVACY AND IDENTITY MANAGEMENT FOR LIFE, 2010, 320 : 266 - +
  • [2] Magentix2: A privacy-enhancing Agent Platform
    Such, Jose M.
    Garcia-Fornes, Ana
    Espinosa, Agustin
    Bellver, Joan
    [J]. ENGINEERING APPLICATIONS OF ARTIFICIAL INTELLIGENCE, 2013, 26 (01) : 96 - 109
  • [3] Privacy-Enhancing Technology and Everyday Augmented Reality
    O'hagan, Joseph
    Saeghe, Pejman
    Gugenheimer, Jan
    Medeiros, Daniel
    Marky, Karola
    Khamis, Mohamed
    Mcgill, Mark
    [J]. Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies, 2023, 6 (04)
  • [4] Privacy-enhancing technologies
    Senicar, V
    Klobucar, T
    Jerman-Blazic, B
    [J]. SECURITY AND PRIVACY IN ADVANCED NETWORKING TECHNOLOGIES, 2004, 193 : 213 - 227
  • [5] A Privacy-Enhancing Architecture for Databases
    Wahlstrom, Kirsten
    Quirchmayr, Gerald
    [J]. JOURNAL OF RESEARCH AND PRACTICE IN INFORMATION TECHNOLOGY, 2008, 40 (03): : 151 - 162
  • [6] Inaccuracy as a privacy-enhancing tool
    Gloria González Fuster
    [J]. Ethics and Information Technology, 2010, 12 : 87 - 95
  • [7] Privacy-Enhancing Overlays in Bitcoin
    Meiklejohn, Sarah
    Orlandi, Claudio
    [J]. FINANCIAL CRYPTOGRAPHY AND DATA SECURITY (FC 2015), 2015, 8976 : 127 - 141
  • [8] On the Adoption of Privacy-enhancing Technologies
    Caulfield, Tristan
    Ioannidis, Christos
    Pym, David
    [J]. DECISION AND GAME THEORY FOR SECURITY, (GAMESEC 2016), 2016, 9996 : 175 - 194
  • [9] Privacy-enhancing technologies for the Internet
    Goldberg, I
    Wagner, D
    Brewer, E
    [J]. IEEE COMPCON 97, PROCEEDINGS, 1997, : 103 - 109
  • [10] Practical Privacy-Enhancing Technologies
    Hajny, Jan
    Malina, Lukas
    Dzurenda, Petr
    [J]. 2015 38TH INTERNATIONAL CONFERENCE ON TELECOMMUNICATIONS AND SIGNAL PROCESSING (TSP), 2015, : 60 - 64