Software piracy prevention through diversity
Proceedings of the 4th ACM workshop on Digital rights management
Protecting Client Privacy with Trusted Computing at the Server
IEEE Security and Privacy
Digital Rights Management in Ubiquitous Computing
IEEE MultiMedia
Trust[ed | in] computing, signed code and the heat death of the internet
Proceedings of the 2006 ACM symposium on Applied computing
ISP'06 Proceedings of the 5th WSEAS International Conference on Information Security and Privacy
Modeling privacy compromise: visibility of individuals via DRM and RFID in ubiquitous computing
Proceedings of the 2008 Spring simulation multiconference
Enhanced Security by OS-Oriented Encapsulation in TPM-Enabled DRM
Information Security and Cryptology
PAES: Policy-Based Authority Evaluation Scheme
Proceedings of the 23rd Annual IFIP WG 11.3 Working Conference on Data and Applications Security XXIII
Wake up or fall asleep-value implication of trusted computing
Information Technology and Management
Trusted computing: special aspects and challenges
SOFSEM'08 Proceedings of the 34th conference on Current trends in theory and practice of computer science
Foundations of security analysis and design IV
Secure cross-domain data sharing architecture for crisis management
Proceedings of the tenth annual ACM workshop on Digital rights management
Using secure coprocessors to protect access to enterprise networks
NETWORKING'05 Proceedings of the 4th IFIP-TC6 international conference on Networking Technologies, Services, and Protocols; Performance of Computer and Communication Networks; Mobile and Wireless Communication Systems
Hi-index | 0.00 |
The Trusted Computing Platform Architecture (TCPA) and the Microsoft's Palladium have similar (though not identical) architectures and similar goals. Both systems are part of a more general approach called trusted computing (TC). In this article the author introduces TC's basic concepts and discusses their implications. However, the individual proposals are still in flux and some kind of convergence between them seems likely, so he only discusses the general features of TC.