Trusted Computing: Challenges & Solutions

被引:0
作者
Awang, Nor Fatimah Bt [1 ]
机构
[1] Natl Def Univ Malaysia, Dept Comp Sci, Kuala Lumpur 57000, Malaysia
来源
COMPUTING & INFORMATICS | 2009年
关键词
Trusted Computing; Security; Network;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Most citizens of the world today are fighting for either by battling viruses, spam, phishing or other malware, or by fending off schemes to compromise privacy and extract confidential information. With these worries in mind, the Trusted Computing Group (TCG) was established to develop specifications for trusted computing building blocks and software interfaces that could address the problems and aims to enhance security by using the transitive properties of trust. Unfortunately Trusted Computing is a young technology and struggling with some drawbacks. There are major issues related to technical as well commercial that need to be addressed seriously and carefully. From user's perspective, TC was introduced from desire to prevent users from freely sharing and using potentially technology and seems will introduce more benefits to vendors and large corporations. The main legal concerns are copyright, anti-trust law, data privacy law and digital rights management, the impact on which are not yet clear. This paper will discuss the challenges that currently faced with Trusted Computing in all aspects from different perspective and at the same time provide several solutions to overcome the challenges.
引用
收藏
页码:434 / 438
页数:5
相关论文
共 11 条
[1]  
Bajikar S., 2002, Trusted Platform Module (TPM) Based Security on Notebook PCs - White Paper
[2]  
CHALLENER D, 2007, PRACTICAL GUIDE TRUS, P77
[3]  
CRANOR LF, 1998, P3P GUIDING PRINCIPL
[4]  
*INT, 2003, PROT YOUR VIT BUS DA
[5]  
LIOY A, 2007, TRUSTED COMPUTING IN
[6]  
MOLSBERRY F, 2006, DELL POWER SOLUTION, P13
[7]  
Schoen Seth., 2003, TRUSTED COMPUTING PR
[8]  
Stallman R., 2004, Free Software, Free Society
[9]  
*TCG GROUP, 2007, TCG SPEC ARCH OV
[10]  
*TCG GROUP, 2009, TRUST COMP