COSPA Knowledge Base >
COSPA Knowledge Base >
Comparison, selection, & suitability of OSS >
Please use this identifier to cite or link to this item:
http://hdl.handle.net/2038/871
|
Title: | Trusted Computing: Promise and Risk |
Authors: | Schoen, Seth |
Keywords: | software, computing, security, users, remote, control, system, microsoft, network |
Description: | Computer security is undeniably important, and as new vulnerabilities are discovered and exploited, the perceived need for new security solutions grows. "Trusted computing" initiatives propose to solve some of today's security problems through hardware changes to the personal computer. Changing hardware design isn't inherently suspicious, but the leading trusted computing proposals have a high cost: they provide security to users while giving third parties the power to enforce policies on users' computers against the
users' wishes -- they let others pressure you to hand some control over your PC to someone else. This is a "feature" ready-made for abuse by software authors who want to anticompetitively choke off rival software. It needn't be this way: a straightforward change to the plans of trusted computing vendors could leave the security benefits intact while ensuring that a PC owner's will always trumps the wishes of those who've loaded software or data onto the PC. |
Issue Date: | 11-Apr-2006 |
URI: | http://hdl.handle.net/2038/871 |
Appears in Collections: | Comparison, selection, & suitability of OSS
|
Files in This Item:
File |
Size | Format |
20031001_tc.pdf | 197Kb | Adobe PDF | View/Open |
|
Show full item record
All items in COSPA Knowledge Base are protected by copyright, with all rights reserved.
View comments
Add comment
|