Abstract
Put simply, trusted computing platforms attempt to use some degree of hardware security to secure a broader platform and the distributed applications that use it. We have seen two main thrusts:
-
secure coprocessors (trustworthy platforms protected by a physical security boundary), and
-
trusted platform modules (smaller non-computational units that add trustworthiness to a platform that lies outside the physical security boundary).
(In this taxonomy, the areas of personal tokens and cryptographic accelerators would probably fit as an offshoot of the former.)
Preview
Unable to display preview. Download preview PDF.
Further Reading
D. Lie, C. Thekkath, and M. Horowitz. Implementing an Untrusted Operating System on Trusted Hardware. In Proceedings of the 19th ACM Symposium on Operating Systems Principles (SOSP 2003 ), pages 178–192, 2003. [GPC+ 03]
H. Levy. Capability-Based Computer Systems. Digital Press, 1984. Out of print, but a free online copy lives at http://www.cs.washington.edu/homes/ levy/ capabook.
Sta03] N. Stam. Inside Intel’s Secretive ‘LaGrande’ Project. http://www.extremetech.com/, September 2003.
Microsoft Next-Generation Secure Computing Base—Technical FAQ. Mi crosoft TechNet, July 2003.
Security Model for the Next-Generation Secure Computing Base. Windows Platform Design Notes, 2003.
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer Science+Business Media New York
About this chapter
Cite this chapter
Smith, S.W. (2005). New Horizons. In: Trusted Computing Platforms: Design and Applications. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-662-41015-8_12
Download citation
DOI: https://doi.org/10.1007/978-3-662-41015-8_12
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-7-302-13174-8
Online ISBN: 978-3-662-41015-8
eBook Packages: Computer ScienceComputer Science (R0)