Abstract

Admittedly, the term "Trusted Computing" isn't as conspiratorial as it sounds. Within computer security circles, to "trust" a system has a long and legitimate history describing available degrees of credentials. Indeed, the Trusted Computing Group, a Who's Who list of major technology vendors from Microsoft to Intel to IBM, consciously emphasizes the security pedigree implied by their name. But don't let the name fool you. Ultimately, it isn't the machines the TCG aims to make trustworthy. It's their customers.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call