Abstract
Few technologies have gained as much public attention over the last years as the concept of Trusted Computing — while its proponents claim that this technology may finally help overcoming the fundamental and increasing security problems, the opponents see it as an instrument of industry to suppress its customers. In this article, we give a short overview on what the technology actually does, and analyse the real opportunities as well as problems that come with its global usage.
Chapter PDF
Similar content being viewed by others
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
References
Hewlett-Packard. 2003. Trusted Computing Platforms: TCPA Technology in Context. Prentice Hall PTR.
Koenig, C., Neumann, A., and Katzschmann, T. 2004. Trusted Computing. Recht und Wirtschaft.
Kursawe, K. and Stüble, C. 2003.. Improving End-user Security and Trustworthiness of TCG-Platforms. Technical report, Saarland University. http://www-krypt.cs.uni-sb.de/download/papers/KurStu2003.pdf.
Microsoft, 2003. Next Generation Secure Computing Base.. http://www.microsoft.com/resources/ngscb/default.mspx.
Poritz, J., Schunter, M, Herreweghen, E.V. and Waidner, M. 2004. Property attestation—scalable and privacy-friendly security assessment of peer computers. Technical Report RZ3548, IBM.
Reimer, H., 2004. Schwerpunkt: Trusted computing. Datenschutz und Datensicherheit (DUD), (9).
Sadeghi, A.-R. and Stüble, C. 2004. Property-based attestation for computing platforms: Caring about policies, not mechanisms. In New Security Paradigms Workshop.
Schoen, S., 2004. EFF comments on TCG design, implementation and usage principles. www.eff.org/Infrastructure/trusted\_computing/20041004\_eff\_comments\_tcg\_principles.pdf.
Thompson, K. 1995. Reflections on Trusting Trust. Communications of the ACM, 27(8):761–763.
Trusted Computing Group, 2004. TPM Specification version 1.2. https://www.trustedcomputinggroup.org/.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2006 International Federation for Information Processing
About this paper
Cite this paper
Kursawe, K., Wolf, C. (2006). Trusted Computing, or the Gatekeeper. In: Zielinski, C., Duquenoy, P., Kimppa, K. (eds) The Information Society: Emerging Landscapes. IFIP International Federation for Information Processing, vol 195. Springer, Boston, MA. https://doi.org/10.1007/0-387-31168-8_20
Download citation
DOI: https://doi.org/10.1007/0-387-31168-8_20
Publisher Name: Springer, Boston, MA
Print ISBN: 978-0-387-30527-1
Online ISBN: 978-0-387-31168-5
eBook Packages: Computer ScienceComputer Science (R0)