Randomized instruction set emulation to disrupt binary code injection attacks
Proceedings of the 10th ACM conference on Computer and communications security
Randomized instruction set emulation
ACM Transactions on Information and System Security (TISSEC)
Protecting Client Privacy with Trusted Computing at the Server
IEEE Security and Privacy
Property-based attestation for computing platforms: caring about properties, not mechanisms
NSPW '04 Proceedings of the 2004 workshop on New security paradigms
Trust[ed | in] computing, signed code and the heat death of the internet
Proceedings of the 2006 ACM symposium on Applied computing
Establishing the genuinity of remote computer systems
SSYM'03 Proceedings of the 12th conference on USENIX Security Symposium - Volume 12
Preventing application software piracy: An empirical investigation of technical copy protections
The Journal of Strategic Information Systems
Enhanced Security by OS-Oriented Encapsulation in TPM-Enabled DRM
Information Security and Cryptology
Analyzing trust in technology strategies
Proceedings of the 2006 International Conference on Privacy, Security and Trust: Bridge the Gap Between PST Technologies and Business Services
Trusted Computing: Security and Applications
Cryptologia
Foundations of security analysis and design IV
Daonity: protocol solutions to grid security using hardware strengthened software environment
Proceedings of the 15th international conference on Security protocols
Provision of trusted identity management using trust credentials
iTrust'06 Proceedings of the 4th international conference on Trust Management
Dynamic policy discovery with remote attestation
FOSSACS'06 Proceedings of the 9th European joint conference on Foundations of Software Science and Computation Structures
Autonomic and trusted computing paradigms
ATC'06 Proceedings of the Third international conference on Autonomic and Trusted Computing
Hi-index | 4.10 |
The Trusted Computing Platform Alliance (TCPA) specification is a new computing platform for the next century that will provide for improved trust in the PC platform. Improving information security is an important and timely goal, but not at the cost of further weakening fair use doctrine, encouraging anticompetitive behavior, or eliminating privacy. Unfortunately, the current specification does not meet this standard.