Skip to main content

Abstract

The notion of a “trusted computing platform” centers, by definition, on trust. The appropriate stakeholders need to be able to trust the computation this platform carries out. However, as Section 1.1 introduced, the concept of “trust” is more nuanced than the naive way we in the security community often use the term. We need to worry about exactly what it is the stakeholder wishes to trust the platform to do. We need to worry about whether the platform is in fact worthy of that trust. Finally, we also need to worry about how it is the stakeholder knows that the platform is in fact worthy of this trust.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Further Reading

  1. S.W. Smith and V. Austel. Trusting Trusted Hardware: Towards a Formal Model for Programmable Secure Coprocessors. In Proceedings of the 3rd USENIX Workshop on Electronic Commerce, August 1998.

    Google Scholar 

  2. S.W. Smith, R. Perez, S.H. Weingart, and V. Austel. Validating a High Performance, Programmable Secure Coprocessor. In 22nd National Informa¬tion Systems Security Conference, October 1999.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer Science+Business Media New York

About this chapter

Cite this chapter

Smith, S.W. (2005). Validation. In: Trusted Computing Platforms: Design and Applications. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-662-41015-8_8

Download citation

  • DOI: https://doi.org/10.1007/978-3-662-41015-8_8

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-7-302-13174-8

  • Online ISBN: 978-3-662-41015-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics