Understanding trusted computing: Will its benefits outweigh its drawbacks?

Edward W. Felten

Research output: Contribution to journalReview articlepeer-review

53 Scopus citations

Abstract

The basic concepts and implications of trusted computing (TC) are discussed. TC operates through a combination of hardware and software, manufacturers add a little bit of new hardware to each computer to support TC function and then a special TC operating system mediates between the hardware and TC-enabled applications. TC provides two basic services which includes authenticated boot and encryption. An authentication boot service monitors what operating system software was booted on the computer and gives applications a sure way to tell which operating system (OS) is running. The encryption lets data be encrypted in such a way that it can be decrypted only by a certain machine and only if that machine is in a certain configuration.

Original languageEnglish (US)
Pages (from-to)60-62
Number of pages3
JournalIEEE Security and Privacy
Volume1
Issue number3
DOIs
StatePublished - May 2003

All Science Journal Classification (ASJC) codes

  • Computer Networks and Communications
  • Electrical and Electronic Engineering
  • Law

Fingerprint

Dive into the research topics of 'Understanding trusted computing: Will its benefits outweigh its drawbacks?'. Together they form a unique fingerprint.

Cite this