Abstract
Trusted virtualisation is anticipated to become the dominant form of Trusted Computing in PCs and servers because it enables isolation of applications, and simplifies determination of platforms’ trust and security properties. Trusted Computing can enable platforms to provide trusted services such as cryptographic erasure of data, negotiations for the supply of services, single-sign-on, and digital signatures. These provide greater confidence in the use of computer platforms. Nothing is free, however, and Trusted Computing is no exception: it requires a public key infrastructure and other infrastructure that is peculiar to Trusted Computing.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer International Publishing Switzerland
About this chapter
Cite this chapter
Proudler, G., Chen, L., Dalton, C. (2014). Futures for Trusted Computing. In: Trusted Computing Platforms. Springer, Cham. https://doi.org/10.1007/978-3-319-08744-3_2
Download citation
DOI: https://doi.org/10.1007/978-3-319-08744-3_2
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-08743-6
Online ISBN: 978-3-319-08744-3
eBook Packages: Computer ScienceComputer Science (R0)