Trusted Computing: Security and Applications

被引:14
|
作者
Gallery, Eimear [1 ]
Mitchell, Chris J. [1 ]
机构
[1] Univ London, Informat Secur Grp, Egham TW20 0EX, Surrey, England
关键词
computer security; trust; trusted computing; PRIVACY;
D O I
10.1080/01611190802231140
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The main objective of this paper is to highlight some of the major security and application issues confronting trusted computing technology. This technologynow present in a large proportion of new PCs and incorporating a wide range of cryptographic functionalityhas the potential to have a major practical impact, but it has not been widely discussed. This paper is an attempt to encourage greater debate about this technology and its possible implications. Following a brief introduction to the history of trusted computing, we provide a summary of its main features. This leads naturally to a consideration of the issues that may impede its use, including potential problems with its cryptographic components. Possible applications of the technology are then discussed.
引用
收藏
页码:217 / 245
页数:29
相关论文
共 50 条
  • [1] Mobile Security and Trusted Computing
    Mitchell, Chris
    [J]. IT-INFORMATION TECHNOLOGY, 2006, 48 (06): : 321 - 326
  • [2] TRUSTED COMPUTING AND INFORMATION SECURITY
    Zhang Huanguo
    Mu Yi
    [J]. CHINA COMMUNICATIONS, 2013, 10 (11) : IX - X
  • [3] TRUSTED COMPUTING AND INFORMATION SECURITY
    张焕国
    MU Yi
    [J]. China Communications, 2013, 10 (11) : 11 - 12
  • [4] An Efficient Security Architecture for Trusted Computing
    Yin Zhixi
    [J]. 2009 2ND IEEE INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY, VOL 4, 2009, : 599 - 601
  • [5] OSLO: Improving the security of trusted computing
    Kauer, Bernhard
    [J]. USENIX ASSOCIATION PROCEEDINGS OF THE 16TH USENIX SECURITY SYMPOSIUM, 2007, : 229 - 237
  • [6] Security Architecture of Trusted Virtual Machine Monitor for Trusted Computing
    HUANG Qiang1
    2. Naval Institute of Computing Technology
    3. College of Information Technical Science
    [J]. Wuhan University Journal of Natural Sciences, 2007, (01) : 13 - 16
  • [7] The Trusted Computing exemplary with Astonishing Security for Cloud Computing
    Devi, Ramya M.
    Balamurugan, P. S.
    Thanushkodi, K.
    [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2011, 11 (01): : 206 - 209
  • [8] Security strategy of DRM based on trusted computing
    Yan, Jianhong
    Peng, Xinguang
    [J]. Journal of Computational Information Systems, 2011, 7 (09): : 3226 - 3234
  • [9] Trusted computing and advanced security in edge computing and Internet of Things
    Cang, Li Shan
    Al-Dubai, Ahmed
    Song, Houbing
    Mumtaz, Shahid
    [J]. TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2022, 33 (06):
  • [10] Trusted computing - Path to security or road to servitude?
    Hilley, Sarah
    [J]. Network Security, 2004, 2004 (08) : 12 - 15