An Approach to Establish Trusted Application
Abstract
Recommendations
High Time for Trusted Computing
Attacks on computer systems are increasing in number and seriousness. One way to deal with this threat is to create systems that support trusted computing—having a high degree of trust that the computer is behaving as you expect and only as you expect. ...
Uclinux: a linux security module for trusted-computing-based usage controls enforcement
STC '07: Proceedings of the 2007 ACM workshop on Scalable trusted computingUsage controls allow the distributor of some information to limit how recipients of that information may use it. The Trusted Computing Group has standardized Trusted Platform Modules (TPMs) that are built into an increasing number of computers and could ...
Deploying the trusted platform module (TPM) to increased fairness and trust in P2P file sharing servents
ISP'06: Proceedings of the 5th WSEAS International Conference on Information Security and PrivacyA number of P2P file sharing systems have tried to rate the level of contribution and participation of peers in order to avoid free-riding by selfish peers and increased performance and reliability of file sharing among all peers. However, the proposed ...
Comments
Information & Contributors
Information
Published In
Publisher
IEEE Computer Society
United States
Publication History
Author Tags
Qualifiers
- Article
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 0Total Downloads
- Downloads (Last 12 months)0
- Downloads (Last 6 weeks)0