Trusted Computing: Security and Applications

被引:14
作者
Gallery, Eimear [1 ]
Mitchell, Chris J. [1 ]
机构
[1] Univ London, Informat Secur Grp, Egham TW20 0EX, Surrey, England
关键词
computer security; trust; trusted computing; PRIVACY;
D O I
10.1080/01611190802231140
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The main objective of this paper is to highlight some of the major security and application issues confronting trusted computing technology. This technologynow present in a large proportion of new PCs and incorporating a wide range of cryptographic functionalityhas the potential to have a major practical impact, but it has not been widely discussed. This paper is an attempt to encourage greater debate about this technology and its possible implications. Following a brief introduction to the history of trusted computing, we provide a summary of its main features. This leads naturally to a consideration of the issues that may impede its use, including potential problems with its cryptographic components. Possible applications of the technology are then discussed.
引用
收藏
页码:217 / 245
页数:29
相关论文
共 93 条
[1]  
*3GPP, 2002, PERSONALISATION MOBI
[2]  
Abramson D., 2006, INTEL TECHNOLOGY J, V10, P179, DOI DOI 10.1535/itj.1003.02
[3]  
Anderson Ross., 2003, PODC '03, P3, DOI DOI 10.1145/872035.872036
[4]  
[Anonymous], 2007, TR2007597 DARTM COLL
[5]  
[Anonymous], 2005, Proceedings of the 10th ACM symposium on Access control models and technologies
[6]   Improving the TCPA specification [J].
Arbaugh, B .
COMPUTER, 2002, 35 (08) :77-79
[7]   A secure and reliable bootstrap architecture [J].
Arbaugh, WA ;
Farber, DJ ;
Smith, JM .
1997 IEEE SYMPOSIUM ON SECURITY AND PRIVACY - PROCEEDINGS, 1997, :65-71
[8]  
BALACHEFF B, 2001, P 2001 NEW SEC PAR W, V2001, P79
[9]  
BALACHEFF B, 2000, INFORM SECURITY TECH, V5, P54, DOI DOI 10.1016/S1363-4127(00)87631-1
[10]  
Balfe Shane, 2005, Trusted Computing, P271, DOI 10.1049/PBPC006E_ch10