2004
DOI: 10.1007/978-3-540-24591-9_22
|View full text |Cite
|
Sign up to set email alerts
|

Taming “Trusted Platforms” by Operating System Design

Abstract: Abstract. Experiences of the past have shown that common computing platforms lack security due to architectural problems and complexity. In this context, Microsoft Palladium (Pd) and TCPA are announced to be the next-generation computing platforms, and claimed to improve users' security. However, people are concerned about those capabilities of TCPA/Pd that may allow content providers to gain too much power and control over the use of digital content and users' private information. In this paper, we argue that… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
14
0

Year Published

2004
2004
2011
2011

Publication Types

Select...
5
3
1

Relationship

1
8

Authors

Journals

citations
Cited by 21 publications
(14 citation statements)
references
References 12 publications
(17 reference statements)
0
14
0
Order By: Relevance
“…This may happen until the adoption of next-generation computing platforms, like Palladium/ TCPA, that allow content providers to gain much power and control over the use of digital content and users private information (Sadeghi and Stuble, 2004).…”
Section: Useful Information For a Digital Investigationmentioning
confidence: 99%
“…This may happen until the adoption of next-generation computing platforms, like Palladium/ TCPA, that allow content providers to gain much power and control over the use of digital content and users private information (Sadeghi and Stuble, 2004).…”
Section: Useful Information For a Digital Investigationmentioning
confidence: 99%
“…Typically, on PC and serverbased platforms, Virtualization approaches [16], [4], [12], [15] are used to fulfill the isolation requirement of TCG-MPRA. Specifically, the operating system (OS), runtime environment, resources and applications of a domain are located in a dedicated virtual machine (VM) so that a virtual machine monitor (VMM) or hypervisor assures the isolation of individual domains.…”
Section: Background Informationmentioning
confidence: 99%
“…Some applications to P2P systems are discussed by Zhang et al [34,40]. Applications in other domains are discussed by several authors including [4,14,26,27,35,36,37].…”
Section: Trusted Computingmentioning
confidence: 99%