The basic concepts and implications of trusted computing (TC) are discussed. TC operates through a combination of hardware and software, manufacturers add a little bit of new hardware to each computer to support TC function and then a special TC operating system mediates between the hardware and TC-enabled applications. TC provides two basic services which includes authenticated boot and encryption. An authentication boot service monitors what operating system software was booted on the computer and gives applications a sure way to tell which operating system (OS) is running. The encryption lets data be encrypted in such a way that it can be decrypted only by a certain machine and only if that machine is in a certain configuration.
|Original language||English (US)|
|Number of pages||3|
|Journal||IEEE Security and Privacy|
|State||Published - May 2003|
All Science Journal Classification (ASJC) codes
- Computer Networks and Communications
- Electrical and Electronic Engineering