Skip to main content

Trusted Computing Management Server Making Trusted Computing User Friendly

  • Chapter
Future of Trust in Computing

Abstract

Personal Computers (PC) with build in Trusted Computing (TC) technology are already well known and widely distributed. Nearly every new business notebook contains now a Trusted Platform Module (TPM) and could be used with increased trust and security features in daily application and use scenarios. However in real life the number of notebooks and PCs where the TPM is really activated and used is still very small.

Main reasons for this low acceptance is mostly the complexity of the system and also handling problems by the ITC departments as well as the required amount of resources and work which is associated with daily management and operation, Additionally most users don’t have the technical understanding of operating TPM features by themselves, they just expect that the enterprise PC (with built in TPM) works and all features are available as they know it from other software standard installations.

A similar situation was known about 15 years ago when PCs where very new and the little trained users also in large organisations where left alone with this new technology. The situation changed when networking and centralized ITC management came up and critical, inconvenient and demanding operations like data storage, backup procedures as well as installing new software was done using network centric management tools. Since that time the user can handle a PC as a simple tool and they are not required to learn in depth ITC technology. The typical enterprise PC user knows that the support for critical issues is just at the other end of the network.

We think that the current low use rates of trusted computing functions are based on similar experiences and expectations. Therefore the industry has now developed new TPM and TC management server capabilities, where the trusted platform functions of a PC can easily be handled by the centralized ITC department together with the already established network management functionality of the networks domain server.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

eBook
USD 14.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 19.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

Download references

Authors

Editor information

David Gawrock Helmut Reimer Ahmad-Reza Sadeghi Claire Vishik

Rights and permissions

Reprints and permissions

Copyright information

© 2009 Vieweg+Teubner | GWV Fachverlage GmbH

About this chapter

Cite this chapter

Sothmann, S., Chaudhuri, S. (2009). Trusted Computing Management Server Making Trusted Computing User Friendly. In: Gawrock, D., Reimer, H., Sadeghi, AR., Vishik, C. (eds) Future of Trust in Computing. Vieweg+Teubner. https://doi.org/10.1007/978-3-8348-9324-6_23

Download citation

  • DOI: https://doi.org/10.1007/978-3-8348-9324-6_23

  • Publisher Name: Vieweg+Teubner

  • Print ISBN: 978-3-8348-0794-6

  • Online ISBN: 978-3-8348-9324-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics