Cryptography and Competition Policy - Issues with ‘Trusted Computing’

  • Ross Anderson
Part of the Advances in Information Security book series (ADIS, volume 12)

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. RJ Anderson, ‘Security Engineering-a Guide to Building Dependable Distributed Systems’, Wiley (2001) ISBN 0-471-38922-6Google Scholar
  2. RJ Anderson, “TCPA/Palladium FAQ”, at http://www.cl.cam.ac.uk/users/rja14/tcpa-faq.html
  3. M Magee, “HP inkjet cartridges have built-in expiry dates-Carly’s cunning consumable plan”, The Inquirer, 29 April 2003, at http://www.theinquirer.net/?article=9220
  4. M Broersma, “Printer makers rapped over refill restrictions”, ZDnet Dec 20 2002, at http://news.zdnet.co.uk/story/0.t269-s2127877.00.html
  5. HR Varian, “New Chips Can Keep a Tight Rein on Customers”, New York Times July 4 2002, at http://www.nytimes.com/2002/07/04/business/04SCEN.html
  6. D Becker, “Sony loses Australian copyright case”, on CNN.com, July 26 2002, at http://rss.com.com/2100-1040-946640.html?tag=rn
  7. N Pickler, “Mechanics Struggle With Diagnostics”, AP, June 24 2002; previously at radicus.net; pulled after being referenced in [TCPA-FAQ]; now archived at http://www.ftp.cl.cam.ac.uk/ftp/users/rja14/car-diagnostics.html
  8. LM Ausubel, P Milgrom, “Ascending Auctions with Package Bidding”, 2002, at http://www.ausubel.com/
  9. Trusted Computing Group, http://www.trustedcomputinggroup.org/
  10. J Lettice “Bad publicity, clashes trigger MS Palladium name change”, The Register, Jan 27 2003, at http://www.theregister.co.uk/content/4/29039.html
  11. R Stallman, “Can you trust your computer?”, at http://newsforge.com/newsforge/02/10/21/1449250.shtml?tid=19
  12. Microsoft Corp., “Windows Server 2003”, Feb 20, 2003, at http://www.microsoft.com/windowsserver2003/rm
  13. J Manferdelli, “An Open and Interoperable Foundation for Secure Computing”, in Windows Trusted Platform Technologies Information Newsletter March 2003Google Scholar
  14. A Huang, “Keeping Secrets in Hardware: the Microsoft Xbox Case Study”, May 26 2002, at http://web.mit.edu/bunnie/www/proj/anatak/AIM-2002-008.pdf
  15. P Thurrott, “Microsoft’s Secret Plan to Secure the PC”, WinInfo, June 23, 2002, at http://www.wininformant.com/Articles/Index.cfm?ArticleID=25681
  16. S Lewis, “How Much is Stronger DRM Worth?” at Second International Workshop on Economics and Information Security, at http://www.cpppe.umd.edu/rhsmith3/index.html
  17. SE Schechter, RA Greenstadt, MD Smith, “Trusted Computing, Peer-To-Peer Distribution, and the Economics of Pirated Entertainment”, at Second International Workshop on Economics and Information Security, at http://www.cpppe.umd.edu/rhsmith3/index.html
  18. C Shapiro, H Varian, ‘Information Rules’, Harvard Business School Press (1998), ISBN 0-87584-863-XGoogle Scholar
  19. A Gawer, MA Cusumano, “Platform Leadership: How Intel, Microsoft, and Cisco Drive Industry Innovation”, Harvard Business School Press (2002), ISBN 1-57851-514-9Google Scholar
  20. J Brockmeier, “The Ultimate Lock-In”, Yahoo News. Mar 12 2003, at http://story.news.yahoo.com/news?tmpl=story2&cid=75&ncid=738&e=9&u=/nf/20030312/tc_nf/20982
  21. RJ Anderson, “Why Information Security is Hard-An Economic Perspective”, in Proceedings of the Seventeenth Computer Security Applications Conference IEEE Computer Society Press (2001), ISBN 0-7695-1405-7, pp 358–365, at http://www.cl.cam.ac.uk/ftp/users/rja14/econ.pdf
  22. C Shapiro, “Antitrust Limits to Patent Settlements”, preprint, at http://faculty.haas.berkeley.edu/shapiro/settle.pdf

Copyright information

© Springer Science + Business Media, Inc. 2004

Authors and Affiliations

  • Ross Anderson
    • 1
  1. 1.Cambridge UniversityUSA

Personalised recommendations