Security Engineering: A Guide to Building Dependable Distributed Systems
Security Engineering: A Guide to Building Dependable Distributed Systems
Platform Leadership
Keeping Secrets in Hardware: The Microsoft Xbox Case Study
CHES '02 Revised Papers from the 4th International Workshop on Cryptographic Hardware and Embedded Systems
Why Information Security is Hard-An Economic Perspective
ACSAC '01 Proceedings of the 17th Annual Computer Security Applications Conference
Does Trusted Computing Remedy Computer Security Problems?
IEEE Security and Privacy
DRM, trusted computing and operating system architecture
ACSW Frontiers '05 Proceedings of the 2005 Australasian workshop on Grid computing and e-research - Volume 44
Towards a software architecture for DRM
Proceedings of the 5th ACM workshop on Digital rights management
Trust[ed | in] computing, signed code and the heat death of the internet
Proceedings of the 2006 ACM symposium on Applied computing
Towards an open, trusted digital rights management platform
Proceedings of the ACM workshop on Digital rights management
Compatibility, competition, and control in trusted computing environments
Information Security Tech. Report
Foundations of security analysis and design IV
Hi-index | 0.00 |
The most significant strategic development in information technology over the past year has been 'trusted computing'. This is popularly associated with Microsoft's 'Palladium' project, recently renamed 'NGSCB'. In this paper, I give an outline of the technical aspects of 'trusted computing' and sketch some of the public policy consequences.