Mobility

The Ten-Page Introduction to Trusted Computing

Free registration required

Executive Summary

Networked computer systems underlie a great deal of business, social, and government activity today. Everyone is expected to place a great deal of trust in their correct operation, but experience shows that this trust is often misplaced. Such systems have always been subject to failures due to oversights and mistakes by those who designed them; increasingly such failures are exploited by those with malicious intent. The concept of trusted computing has been present in the computer security literature for quite some time, and has influenced the design of some high-assurance solutions. These ideas are now becoming incorporated in mainstream products - PCs, mobile phones, disc drives, servers - and are the subject of much discussion and sometimes misinformation.

  • Format: PDF
  • Size: 180.2 KB