Abstract
The basic concepts and implications of trusted computing (TC) are discussed. TC operates through a combination of hardware and software, manufacturers add a little bit of new hardware to each computer to support TC function and then a special TC operating system mediates between the hardware and TC-enabled applications. TC provides two basic services which includes authenticated boot and encryption. An authentication boot service monitors what operating system software was booted on the computer and gives applications a sure way to tell which operating system (OS) is running. The encryption lets data be encrypted in such a way that it can be decrypted only by a certain machine and only if that machine is in a certain configuration.
Original language | English (US) |
---|---|
Pages (from-to) | 60-62 |
Number of pages | 3 |
Journal | IEEE Security and Privacy |
Volume | 1 |
Issue number | 3 |
DOIs | |
State | Published - May 2003 |
All Science Journal Classification (ASJC) codes
- Computer Networks and Communications
- Electrical and Electronic Engineering
- Law