Download now Free registration required
Until recently, all the security measures have addressed servers or networks while clients or network endpoints have missed the required security concerns relatively. Most of the mechanisms safeguarding endpoints (clients) are software based. Making endpoints survive in open and reasonably exposed environments-like internet-demand that client security should stand by a tried and true dependence and merely software based mechanisms are inadequate in providing the desired security level. Trusted Computing (TC) initiatives solve these security problems through operating environments, applications and secure hardware changes to the personal computer. Using secure hardware as a basis for trusted computing provides a level of relevance since hardware-based security is mooted difficult to compromise than conventional approaches.
- Format: PDF
- Size: 398.4 KB