Abstract
This paper assesses how trusted computing technology can enhance privacy, both in the short and long term, and provides a variety of examples. In addition, potential negative privacy implications are assessed and outstanding issues are highlighted that need to be addressed before trusted computing could be provided in a privacy-friendly manner within the consumer space.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Brands, S.: A Semi-Technical Overview of Digital Credentials, International Journal on Information Security (August. 2002), Available via, http://www.credentica.com
Cannon, J.C.: Privacy. Addison-Wesley, Reading (2004)
Chaum, D.: Untraceable electronic mail, return addresses and digital pseudonyms. Communication of ACMÂ 24(2) (February 1981)
Chaum, D.: Security without Identification: Card Computers to make Big Brother Obsolete. Communication of ACM 28(10), 1030–1044 (1985)
Chaum, D.: Achieving Electronic Privacy. Scientific American, 96–101 (August 1992)
Erickson, J.: Fair Use, DRM and Trusted Computing: Friends or Foes? Comm. of ACM (November 2002)
Intel, LaGrande Technology Architectural Overview (September 2003), available via http://www.intel.com/technology/security/downloads/LT_Arch_Overview.pdf
Kuhlmann, D.: On TCPA. In: Wright, R.N. (ed.) FC 2003. LNCS, vol. 2742, pp. 255–269. Springer, Heidelberg (2003)
Microsoft, Next-Generation Secure Computing Base home page, http://www.microsoft.com/resources/ngscb
Pearson, S. (ed.): Trusted Computing Platforms. Prentice Hall, Englewood Cliffs (2002)
Pearson, S.: A Trusted Method for Self-profiling in e-Commerce. In: Falcone, R., Barber, S.K., Korba, L., Singh, M.P. (eds.) AAMAS 2002. LNCS (LNAI), vol. 2631, pp. 177–193. Springer, Heidelberg (2003)
Pearson, S., Casassa Mont, M., Crane, S.: Persistent and Dynamic Trust: Analysis and the Related Impact of Trusted Platforms. In: Herrmann, P., Issarny, V., Shiu, S.C.K. (eds.) iTrust 2005. LNCS, vol. 3477, pp. 355–363. Springer, Heidelberg (2005)
Trusted Computing Group, TCG Main Specification, Version 1.1b (2003), available via http://www.trustedcomputinggroup.org
Trusted Computing Group, TCG TPM Specification, Version 1.2 (2003), available via http://www.trustedcomputinggroup.org
Yung, M.: Trusted computing platforms: The good, the bad, and the ugly. In: Wright, R.N. (ed.) FC 2003. LNCS, vol. 2742, pp. 250–254. Springer, Heidelberg (2003)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Pearson, S. (2005). Trusted Computing: Strengths, Weaknesses and Further Opportunities for Enhancing Privacy. In: Herrmann, P., Issarny, V., Shiu, S. (eds) Trust Management. iTrust 2005. Lecture Notes in Computer Science, vol 3477. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11429760_21
Download citation
DOI: https://doi.org/10.1007/11429760_21
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-26042-4
Online ISBN: 978-3-540-32040-1
eBook Packages: Computer ScienceComputer Science (R0)