Skip to main content
  • 184 Accesses

Abstract

Put simply, trusted computing platforms attempt to use some degree of hardware security to secure a broader platform and the distributed applications that use it. We have seen two main thrusts:

  • secure coprocessors (trustworthy platforms protected by a physical security boundary), and

  • trusted platform modules (smaller non-computational units that add trustworthiness to a platform that lies outside the physical security boundary).

(In this taxonomy, the areas of personal tokens and cryptographic accelerators would probably fit as an offshoot of the former.)

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Further Reading

  1. D. Lie, C. Thekkath, and M. Horowitz. Implementing an Untrusted Operating System on Trusted Hardware. In Proceedings of the 19th ACM Symposium on Operating Systems Principles (SOSP 2003 ), pages 178–192, 2003. [GPC+ 03]

    Article  Google Scholar 

  2. H. Levy. Capability-Based Computer Systems. Digital Press, 1984. Out of print, but a free online copy lives at http://www.cs.washington.edu/homes/ levy/ capabook.

    Google Scholar 

  3. Sta03] N. Stam. Inside Intel’s Secretive ‘LaGrande’ Project. http://www.extremetech.com/, September 2003.

  4. Microsoft Next-Generation Secure Computing Base—Technical FAQ. Mi crosoft TechNet, July 2003.

    Google Scholar 

  5. Security Model for the Next-Generation Secure Computing Base. Windows Platform Design Notes, 2003.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer Science+Business Media New York

About this chapter

Cite this chapter

Smith, S.W. (2005). New Horizons. In: Trusted Computing Platforms: Design and Applications. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-662-41015-8_12

Download citation

  • DOI: https://doi.org/10.1007/978-3-662-41015-8_12

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-7-302-13174-8

  • Online ISBN: 978-3-662-41015-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics