2009
DOI: 10.1007/s10799-009-0060-7
|View full text |Cite
|
Sign up to set email alerts
|

Wake up or fall asleep-value implication of trusted computing

Abstract: More than 10 years have passed since trusted computing (TC) technology was introduced to the market; however, there is still no consensus about its value. The increasing importance of user and enterprise security and the security promised by TC, coupled with the increasing tension between the proponents and the opponents of TC, make it timely to investigate the value relevance of TC in terms of both capital market and accounting performance. Based on both price and volume studies, we found that news releases r… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2010
2010
2010
2010

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 47 publications
0
1
0
Order By: Relevance
“…Hardware Root of Trust (RoT)) begins at the factory's firmware install and further updates are managed by the vault itself. The TPM trusts only itself after being manufactured and is dependent on the host's processor to deliver or receive plain text information to be encrypted or decrypted [23], [24]. If the host is compromised by a trojan, then the plain text data can be leaked to other destinations.…”
Section: Other Issuesmentioning
confidence: 99%
“…Hardware Root of Trust (RoT)) begins at the factory's firmware install and further updates are managed by the vault itself. The TPM trusts only itself after being manufactured and is dependent on the host's processor to deliver or receive plain text information to be encrypted or decrypted [23], [24]. If the host is compromised by a trojan, then the plain text data can be leaked to other destinations.…”
Section: Other Issuesmentioning
confidence: 99%