Trusted computing: Challenges & solutions
Most citizens of the world today are fighting for – either by battling viruses, spam, phishing or other malware, or by fending off schemes to compromise privacy and extract confidential information.With these worries in mind, the Trusted Computing Group (TCG) was established to develop specificatio...
Saved in:
Main Author: | |
---|---|
Format: | Conference or Workshop Item |
Language: | English |
Published: |
2009
|
Subjects: | |
Online Access: | http://repo.uum.edu.my/13540/1/PID229.pdf http://repo.uum.edu.my/13540/ http://www.icoci.cms.net.my |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Universiti Utara Malaysia |
Language: | English |
id |
my.uum.repo.13540 |
---|---|
record_format |
eprints |
spelling |
my.uum.repo.135402015-04-02T03:40:54Z http://repo.uum.edu.my/13540/ Trusted computing: Challenges & solutions Awang, Nor Fatimah QA75 Electronic computers. Computer science Most citizens of the world today are fighting for – either by battling viruses, spam, phishing or other malware, or by fending off schemes to compromise privacy and extract confidential information.With these worries in mind, the Trusted Computing Group (TCG) was established to develop specifications for trusted computing building blocks and software interfaces that could address the problems and aims to enhance security by using the transitive properties of trust. Unfortunately Trusted Computing is a young technology and struggling with some drawbacks. There are major issues related to technical as well commercial that need to be addressed seriously and carefully.From user’s perspective, TC was introduced from desire to prevent users from freely sharing and using potentially technology and seems will introduce more benefits to vendors and large corporations.The main legal concerns are copyright, anti-trust law, data privacy law and digital rights management, the impact on which are not yet clear. This paper will discuss the challenges that currently faced with Trusted Computing in all aspects from different perspective and at the same time provide several solutions to overcome the challenges. 2009-06-24 Conference or Workshop Item PeerReviewed application/pdf en http://repo.uum.edu.my/13540/1/PID229.pdf Awang, Nor Fatimah (2009) Trusted computing: Challenges & solutions. In: International Conference on Computing and Informatics 2009 (ICOCI09), 24-25 June 2009, Legend Hotel, Kuala Lumpur. http://www.icoci.cms.net.my |
institution |
Universiti Utara Malaysia |
building |
UUM Library |
collection |
Institutional Repository |
continent |
Asia |
country |
Malaysia |
content_provider |
Universiti Utara Malaysia |
content_source |
UUM Institutionali Repository |
url_provider |
http://repo.uum.edu.my/ |
language |
English |
topic |
QA75 Electronic computers. Computer science |
spellingShingle |
QA75 Electronic computers. Computer science Awang, Nor Fatimah Trusted computing: Challenges & solutions |
description |
Most citizens of the world today are fighting for – either by battling viruses, spam, phishing or other malware, or by fending off schemes to compromise privacy and extract confidential information.With these worries in mind, the
Trusted Computing Group (TCG) was established to develop specifications for trusted computing building blocks and software interfaces that could address the problems and aims to enhance security by using the transitive properties of trust. Unfortunately Trusted Computing is a young technology and struggling with some drawbacks. There are major issues related to technical as well commercial that need to be addressed seriously and carefully.From user’s perspective,
TC was introduced from desire to prevent users from freely sharing and using potentially technology and seems will introduce more benefits to vendors and large corporations.The main legal concerns are copyright, anti-trust law, data
privacy law and digital rights management, the impact on which are not yet clear. This paper will discuss the challenges that currently faced with Trusted Computing in all aspects from different perspective and at the same time provide several solutions to overcome the challenges. |
format |
Conference or Workshop Item |
author |
Awang, Nor Fatimah |
author_facet |
Awang, Nor Fatimah |
author_sort |
Awang, Nor Fatimah |
title |
Trusted computing: Challenges & solutions |
title_short |
Trusted computing: Challenges & solutions |
title_full |
Trusted computing: Challenges & solutions |
title_fullStr |
Trusted computing: Challenges & solutions |
title_full_unstemmed |
Trusted computing: Challenges & solutions |
title_sort |
trusted computing: challenges & solutions |
publishDate |
2009 |
url |
http://repo.uum.edu.my/13540/1/PID229.pdf http://repo.uum.edu.my/13540/ http://www.icoci.cms.net.my |
_version_ |
1644281213317283840 |