“…Several systems have been built using trusted computing concepts such as the Next Generation Secure Computing Base by Microsoft [59], Trusted Execution Technology by Intel [3], secure co-processors by IBM [25], [1], and others [40], [47], [49], [73]. In addition, researchers have developed systems that utilize the TPM for anonymous attestation [69], authentication [21], [56], device attestation [30], [52], digital rights management [45], digital signature [9], [71], distributed computing [35], [67], drive encryption [26], e-voting [75], grid security [48], [50], [51], identity management [43], [54], mobile agents [58], [62], on-line payment [12], on-line storage [76], peer-to-peer networks [11], [38], policy enforcement [5], [63], [66], and virtualization [13], [29]. These studies, however, do not consider a security service that will hide information from the rest of the system including the system administrator as in blind processing.…”