Abstract

One can expect a number of new applications that support the management of large networks, for example, to automatically verify that all machines have a proper patch level or only contain company authorised software, to maintain control over signature and encryption keys, etc. As trusted computing (TC) technology exists on the lowest hardware level of the computer, it has to be further supported by higher-level functionality such as the operating system before mainstream applications can fully profit from the concept. Thus, outside of such applications and those that use cryptography anyway, little use will be made of TC in the near future. The candidate application that always most commonly appears in the press and various Internet discussions is the use of TC for digital rights management (DRM), i.e. the option to attach a policy to a piece of data and remotely enforce this policy. While research in this area is becoming rather active, the author is not aware of any attempts to use Trusted Computing Group (TCG) technology to this end on a personal computer (PC) platform. It is debatable if the TC concepts can significantly assist a DRM system on a PC platform without massive changes to the underlying operating system. Without some significant innovation, a DRM system using the Trusted Platform Module will probably not be much more secure than one without.

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.