The paternalistic paternalism of TC
Seth Schoen has posted a very interesting blog entry about some trends in the trusted computing research community according to which educating users about comp…
Seth Schoen has posted a very interesting blog entry about some trends in the trusted computing research community according to which educating users about comp…
Tony McFadden, TPM Matrix. List of known TPM manufacturers and implementations. 2005.…
Bruce Schneier has written an interesting and widely-circulated blog entry about TCG's Best Practices document. He is wondering why the document applies to…
Siani Pearson, Trusted Computing: Strenghts, Weaknesses and Further Opportunities for Enhancing Privacy, in: Herrmann et al. (eds.), iTrust 2005, Proceedings, S…
Although much of the policy discussion has focused on the problems created by TCG's remote attestation feature, people like Ross Anderson and, to some exten…
Ulrich Kühn, Klaus Kursawe, Stefan Lucks, Ahmad-Reza Sadeghi & Christian Stüble: Secure Data Management in Trusted Computing. In: Proceedings of the Worksho…
Over the last year or so, computer science research on code attestation has increased considerably. I have blogged about current research to overcome the policy…
Elaine Shi, Adrian Perrig & Leendert Van Doorn, BIND: A Fine-grained Attestation Service for Secure Distributed Systems, in: Proceedings of the 2005 IEEE Sy…
Seth Schoen, Compatibility, competition, and control in trusted computing environments, Information Security Technical Report (2005) 10, 105-119…
Ahmad-Reza Sadeghi & Christian Stüble, Towards multilaterally secure computing platforms - with open source and trusted computing, Information Security Tech…
David Safford & Mimi Zohar, Trusted computing and open source, Information Security Technical Report (2005) 10, 74-82.…
Sean Smith, Trusted Computing Platforms - Design and Applications, Springer 2005.…