Trusted computing: Challenges & solutions

Most citizens of the world today are fighting for – either by battling viruses, spam, phishing or other malware, or by fending off schemes to compromise privacy and extract confidential information.With these worries in mind, the Trusted Computing Group (TCG) was established to develop specificatio...

Full description

Saved in:
Bibliographic Details
Main Author: Awang, Nor Fatimah
Format: Conference or Workshop Item
Language:English
Published: 2009
Subjects:
Online Access:http://repo.uum.edu.my/13540/1/PID229.pdf
http://repo.uum.edu.my/13540/
http://www.icoci.cms.net.my
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Universiti Utara Malaysia
Language: English
id my.uum.repo.13540
record_format eprints
spelling my.uum.repo.135402015-04-02T03:40:54Z http://repo.uum.edu.my/13540/ Trusted computing: Challenges & solutions Awang, Nor Fatimah QA75 Electronic computers. Computer science Most citizens of the world today are fighting for – either by battling viruses, spam, phishing or other malware, or by fending off schemes to compromise privacy and extract confidential information.With these worries in mind, the Trusted Computing Group (TCG) was established to develop specifications for trusted computing building blocks and software interfaces that could address the problems and aims to enhance security by using the transitive properties of trust. Unfortunately Trusted Computing is a young technology and struggling with some drawbacks. There are major issues related to technical as well commercial that need to be addressed seriously and carefully.From user’s perspective, TC was introduced from desire to prevent users from freely sharing and using potentially technology and seems will introduce more benefits to vendors and large corporations.The main legal concerns are copyright, anti-trust law, data privacy law and digital rights management, the impact on which are not yet clear. This paper will discuss the challenges that currently faced with Trusted Computing in all aspects from different perspective and at the same time provide several solutions to overcome the challenges. 2009-06-24 Conference or Workshop Item PeerReviewed application/pdf en http://repo.uum.edu.my/13540/1/PID229.pdf Awang, Nor Fatimah (2009) Trusted computing: Challenges & solutions. In: International Conference on Computing and Informatics 2009 (ICOCI09), 24-25 June 2009, Legend Hotel, Kuala Lumpur. http://www.icoci.cms.net.my
institution Universiti Utara Malaysia
building UUM Library
collection Institutional Repository
continent Asia
country Malaysia
content_provider Universiti Utara Malaysia
content_source UUM Institutionali Repository
url_provider http://repo.uum.edu.my/
language English
topic QA75 Electronic computers. Computer science
spellingShingle QA75 Electronic computers. Computer science
Awang, Nor Fatimah
Trusted computing: Challenges & solutions
description Most citizens of the world today are fighting for – either by battling viruses, spam, phishing or other malware, or by fending off schemes to compromise privacy and extract confidential information.With these worries in mind, the Trusted Computing Group (TCG) was established to develop specifications for trusted computing building blocks and software interfaces that could address the problems and aims to enhance security by using the transitive properties of trust. Unfortunately Trusted Computing is a young technology and struggling with some drawbacks. There are major issues related to technical as well commercial that need to be addressed seriously and carefully.From user’s perspective, TC was introduced from desire to prevent users from freely sharing and using potentially technology and seems will introduce more benefits to vendors and large corporations.The main legal concerns are copyright, anti-trust law, data privacy law and digital rights management, the impact on which are not yet clear. This paper will discuss the challenges that currently faced with Trusted Computing in all aspects from different perspective and at the same time provide several solutions to overcome the challenges.
format Conference or Workshop Item
author Awang, Nor Fatimah
author_facet Awang, Nor Fatimah
author_sort Awang, Nor Fatimah
title Trusted computing: Challenges & solutions
title_short Trusted computing: Challenges & solutions
title_full Trusted computing: Challenges & solutions
title_fullStr Trusted computing: Challenges & solutions
title_full_unstemmed Trusted computing: Challenges & solutions
title_sort trusted computing: challenges & solutions
publishDate 2009
url http://repo.uum.edu.my/13540/1/PID229.pdf
http://repo.uum.edu.my/13540/
http://www.icoci.cms.net.my
_version_ 1644281213317283840