Reflections on trusting trust revisited
Communications of the ACM - E-services: a cornucopia of digital offerings ushers in the next Net-based evolution
A methodology for trust control mode prediction
ISP'06 Proceedings of the 5th WSEAS International Conference on Information Security and Privacy
iControl: comparing control architectures in computing technology
Proceedings of the 2011 iConference
Enhancing trust in mobile enterprise networking
ACOS'06 Proceedings of the 5th WSEAS international conference on Applied computer science
Hi-index | 4.10 |
One of the biggest issues facing computer technology today is data security. The problem has gotten worse because users are working with sensitive information more often, while the number of threats is growing and hackers are developing new types of attacks. Because of this, many technology experts advocate development of trusted computing (TC) systems that integrate data security into their core operations, rather than implementing it via add-on applications. The paper discusses cryptographic trusted computing and trusted computing initiatives.