Abstract
While Trusted Computing is getting increasing attention in the PC world, consumer electronics devices have limited benefit from the Trusted Computing solutions currently under development. In this paper we outline the different requirements of consumer electronics devices, when compared to the PC world, and point out the technical consequences for standards like the Trusted Computing Group. In addition, we will touch on economic aspects that may inhibit or support Trusted Computing in this domain.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
S. Glasgow, cited on Gizmodo Australia http://www.gizmodo.com.au/2008/07/sony_goal_90_of_all_our_products_networked_by_2010.html
T. Kan, T. Kerins, K. Kursawe, Security in Next Generation Consumer Electronics Devices, in Securing Electronic Business Processes, ISSE 2006 Proceedings, pp. 45–53
M. Krigsman, FBI: Counterfeit Cisco routers risk “IT subversion”, http://blogs.zdnet.com/projectfailures/?p=740
Trusted Computing Group, Mobile Phone Specifications Version 1.0. Available at https://www.trustedcomputinggroup.org/specs/mobilephone
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 2009 Vieweg+Teubner | GWV Fachverlage GmbH, Wiesbaden
About this chapter
Cite this chapter
Kursawe, K., Katzenbeisser, S. (2009). Trust in Consumer Electronics. In: Pohlmann, N., Reimer, H., Schneider, W. (eds) ISSE 2008 Securing Electronic Business Processes. Vieweg+Teubner. https://doi.org/10.1007/978-3-8348-9283-6_14
Download citation
DOI: https://doi.org/10.1007/978-3-8348-9283-6_14
Publisher Name: Vieweg+Teubner
Print ISBN: 978-3-8348-0660-4
Online ISBN: 978-3-8348-9283-6
eBook Packages: Computer ScienceComputer Science (R0)