Security without identification: transaction systems to make big brother obsolete
Communications of the ACM
Untraceable electronic mail, return addresses, and digital pseudonyms
Communications of the ACM
Fair use, DRM, and trusted computing
Communications of the ACM - Digital rights management
Trusted Computing Platforms: TCPA Technology in Context
Trusted Computing Platforms: TCPA Technology in Context
A trusted method for self-profiling in e-commerce
AAMAS'02 Proceedings of the 2002 international conference on Trust, reputation, and security: theories and practice
Persistent and dynamic trust: analysis and the related impact of trusted platforms
iTrust'05 Proceedings of the Third international conference on Trust Management
A Privacy Manager for Cloud Computing
CloudCom '09 Proceedings of the 1st International Conference on Cloud Computing
Accountability as a Way Forward for Privacy Protection in the Cloud
CloudCom '09 Proceedings of the 1st International Conference on Cloud Computing
User-centric identity management using trusted modules
EuroPKI'10 Proceedings of the 7th European conference on Public key infrastructures, services and applications
Provision of trusted identity management using trust credentials
iTrust'06 Proceedings of the 4th international conference on Trust Management
Persistent and dynamic trust: analysis and the related impact of trusted platforms
iTrust'05 Proceedings of the Third international conference on Trust Management
A study on scalability of services and privacy issues in cloud computing
ICDCIT'12 Proceedings of the 8th international conference on Distributed Computing and Internet Technology
Enhancing privacy in cloud computing via policy-based obfuscation
The Journal of Supercomputing
Hi-index | 0.00 |
This paper assesses how trusted computing technology can enhance privacy, both in the short and long term, and provides a variety of examples. In addition, potential negative privacy implications are assessed and outstanding issues are highlighted that need to be addressed before trusted computing could be provided in a privacy-friendly manner within the consumer space.