A Critical Comparison of Trusted Computing and Trust Management Technologies

被引:0
作者
Tomaiuolo, Michele [1 ]
机构
[1] Univ Parma, Dept Informat Engn, Parma, Italy
关键词
Authorization; Delegation; Digital Books; Information Access; Intellectual Property Rights; Multimedia; Security; Trust; Web Services;
D O I
10.4018/ijcwt.2014100105
中图分类号
D0 [政治学、政治理论];
学科分类号
0302 ; 030201 ;
摘要
Mainly justified by the growing concern about vulnerabilities of IT systems, some new technologies are being integrated into computing devices, for realizing so-called Trusted Computing systems. However; they are raising questions about intrusive cyber-control over individual user activities and data, but also about consequences in cyber-war scenarios. The aim of this article is to confront Trusted Computing systems with distributed Trust Management systems, which realize access control for local resources on the basis of delegation of access rights, according to local trust decisions. Both technologies are discussed from various points of view: architecture, vision, ethics, politics and law. Some experimentations are also presented, to show the applicability of Trust Management techniques to modem Service-Oriented Architectures.
引用
收藏
页码:64 / 81
页数:18
相关论文
共 83 条
  • [1] Agazzi F., 2013, P 14 WORKSH OBJ AG T
  • [2] Agazzi F., 2014, SCS M S MAGAZINE, V4, P65
  • [3] Anderson A., 2004, SAML 2 0 PROFILE OFX
  • [4] ANDERSON R, 2003, TRUSTED COMPUTING FR
  • [5] Anderson R., 2003, P 22 ANN S PRINC DIS, P3, DOI [10.1145/872035.872036, DOI 10.1145/872035.872036]
  • [6] ARBAUGH B, 2002, IEEE T COMPUT, V35, P77, DOI DOI 10.1109/MC.2002.1023792
  • [7] A secure and reliable bootstrap architecture
    Arbaugh, WA
    Farber, DJ
    Smith, JM
    [J]. 1997 IEEE SYMPOSIUM ON SECURITY AND PRIVACY - PROCEEDINGS, 1997, : 65 - 71
  • [8] Balacheff B., 2000, INFORM SECURITY TECH, V5, P54, DOI DOI 10.1016/S1363-4127(00)87631-1
  • [9] Secret handshakes from pairing-based key agreements
    Balfanz, D
    Durfee, G
    Shankar, N
    Smetters, D
    Staddon, J
    Wong, HC
    [J]. 2003 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2003, : 180 - 196
  • [10] Trusted computing: Providing security for Peer-to-Peer networks
    Balfe, S
    Lakhani, AD
    Paterson, KG
    [J]. FIFTH IEEE INTERNATIONAL CONFERENCE ON PEER-TO-PEER COMPUTING, PROCEEDINGS, 2005, : 117 - 124