The Wayback Machine - https://web.archive.org/web/20090319043100/http://pascal.case.unibz.it:80/handle/2038/871
 

COSPA Knowledge Base > COSPA Knowledge Base > Comparison, selection, & suitability of OSS >

Please use this identifier to cite or link to this item: http://hdl.handle.net/2038/871

Title: Trusted Computing: Promise and Risk
Authors: Schoen, Seth
Keywords: software, computing, security, users, remote, control, system, microsoft, network
Description: Computer security is undeniably important, and as new vulnerabilities are discovered and exploited, the perceived need for new security solutions grows. "Trusted computing" initiatives propose to solve some of today's security problems through hardware changes to the personal computer. Changing hardware design isn't inherently suspicious, but the leading trusted computing proposals have a high cost: they provide security to users while giving third parties the power to enforce policies on users' computers against the users' wishes -- they let others pressure you to hand some control over your PC to someone else. This is a "feature" ready-made for abuse by software authors who want to anticompetitively choke off rival software. It needn't be this way: a straightforward change to the plans of trusted computing vendors could leave the security benefits intact while ensuring that a PC owner's will always trumps the wishes of those who've loaded software or data onto the PC.
Issue Date: 11-Apr-2006
URI: http://hdl.handle.net/2038/871
Appears in Collections:Comparison, selection, & suitability of OSS

Files in This Item:

File SizeFormat
20031001_tc.pdf197KbAdobe PDFView/Open

Show full item record

All items in COSPA Knowledge Base are protected by copyright, with all rights reserved.

View comments
Add comment

Subscribe to this item to receive daily e-mail notification of new additions

 

IF you have any difficulties with this system, please contact us.