Trusted Computing
DOI:
https://doi.org/10.53555/nncse.v1i4.518Keywords:
TRUSTED, COMPUTINGAbstract
Trusted Computing (TC) could be a technology developed and promoted by the trusty Computing cluster. The term is essentially derived from the sphere of trusty systems and incorporates a special which means. With trusty Computing, the pc can systematically behave in expected ways that, and people behaviours are enforced by element and computer code. Trusty computing involves corroboratory that one pc is trustable to a different or not. During this we tend to primarily reaching to specialise in a very important feature associated with trust computing is Trust. within the wide used public-key cryptography, creation of keys is done on the native pc and also the creator has complete or say full management over World Health Organization has access thereto, and consequentially their own security policies. In some planned encryption-decryption chips, a private/public secret's for good embedded into the hardware once it's factory-made, and hardware makers would have the chance to record the key while not effort proof of doing this. With this key it might be potential to possess access to information encrypted with it, and to manifest because it .It would be fairly trivial for a manufacturer to grant a duplicate of this key to the govt. or the computer code makers, because the platform should undergo steps so it works with echo computer code. So as to trust something that's echo by or encrypted by a TPM or a trusty pc, therefore, one needs to trust the corporate that created that chip, the corporate that designed the chip, those corporations allowed to form computer code for the chip, and also the ability and interest of these corporations to not compromise the method. The real goal is to be ready to bind information to applications, users and particularly say computers.
References
I. Alves, T. and Felton, D. (2004). TrustZone: integrated hardware and software security, White paper, ARM.
II. Anderson, R. (2003). Cryptography and competition policy: Issues with trusted computing. Proceedings of the Workshop on Economics and Information Security.
III. AR Baugh, B. (2002). Improving the TCPA specification, IEEE Computer 35(8): 77–79.
IV. Brickell, E., Camenish, J. and Chen, L. (2005). The DAA scheme in context, in Mitchell (2005), chapter 5.
V. Cooper, A. and Martin, A. (2006a). Towards a secure, tamper-proof grid platform. CCGRID, IEEE Computer Society, pp. 373–380.
VI. Cooper, A. and Martin, A. (2006b). Towards an open, trusted digital rights management platform, DRM ’06: Proceedings of the ACM workshop on Digital rights management, ACM Press, New York, NY, USA, pp. 79–88.
VII. DoD (1985). Department of Defense Trusted Computer System Evaluation Criteria, DoD Standard 5200.28-STD, DoD.
VIII. Gollman, D. (2004). Why trust is bad for security. http://www.sics.se/policy2005/Policy Pres1/dg-policy-trust.ppt
IX. Grawrock, D. (2008). Dynamics of a Trusted Platform: A building block approach, Intel Press.
X. Heasman, J. (2006). Implementing and detecting an acpi bios rootkit, presentation.https://www.blackhat.com/presentations/bh-federal-06/BHFed-06-Heasman.pdf
XI. Huh, J. H. and Martin, A. (2008). Trusted logging for grid computing, 3rd Asia-Pacific Trusted Infrastructure Technologies Conference,China.
XII. Kauer, B. (2007). Oslo: Improving the security of trusted computing, Proceedings of the 16th USENIX Security Symposium, Boston, Mass., USA.http://os.inf.tu-dresden.de/papers ps/kauer07-oslo.pdf
XIII. Kuhlmann, D., Lo Presti, S., Ramunno, G., Vernizzi, D., Bayer, E., Katrcolu, M. A. and Gngren, B. (2008). Private electronic transaction (pet) proof-of-concept prototype documentation, Deliverable10c.3, Open Trusted Computing Project.
XIV. Marchesini, J., Smith, S., Wild, O. and MacDonald, R. (2003). Experimenting with TCPA/TCG hardware, or: How I learned to stop worrying and love the bear, Technical Report TR2003-476, Department of Computer Science, Dartmouth College, Hanover, New Hampshire.
XV. Martin, A. and Yau, P.-W. (2007). Grid security: next steps, Information Security Technical Report 12(3): 113–122.
XVI. Mitchell, C. (ed.) (2005). Trusted Computing, The Institution of Electrical Engineers, London.
XVII. Oppliger, R. and Rytz, R. (2005). Does trusted computing remedy computer security problems? IEEE Security and Privacy 3(2): 16–19.
XVIII. Safford, D. (2002). Clarifying misinformation on TCPA. http://www.research.ibm.com/gsal/tcpa/tcpa rebuttal.pdf.
XIX. Stallman, R. M. (2002). Can you trust your computer? in J. Gay (ed.), Free Software, Free Society: Selected Essays of Richard M. Stallman, GNU Press, chapter 17, pp. 117–120.
Downloads
Published
Issue
Section
License
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
Terms & Condition
Submission -
Author can submit the manuscript through our online submission process or email us at the designated email id in contact details.
The other mode of submission not accepted than online and email.
Before submission please read the submission guidelines.
NN Publication accepts only article submitted in pdf/doc/docx/rtf file format. Another format except given file formats will no be considered .
Author will be responsible for the error mistakes in the submission files. The minor changes can be done without any cost after publication. But for major changes NN Publication may charges you the editing charges.
Publication (Online) -
The online publication is scheduled on last date of every month, but it can be delayed by 24 to 48 hours due to editorial process if huge number of articles comes to publish in single issue.
Automatic notificatation email will be sent to the all users on publication of an issue, so its author’s duty to check their email inbox or SPAM folder to get this notification.
After publication of article author can not withdraw their article.
If editor’s found any issue after publication of article then the NN Publication have the authority to remove the article from online website.
No refund will be provided after online publication of article.
Publication (Print) -
The print copy publication are sent as per the author’s request after 2 weeks of online publication of that issue.
NN Publication will ship the article by India Post and provide the consignment number on dispatch of print copy.
NN Publication follows all the guidelines of delivery provided by IndiaPost and hence not responsible for delay in delivery due to any kind of reasons.
Refund of hard copy will not be provided after dispatch or print of the journal.
NN Publication will be responsible for raise a complain if there is any issue occurs in delivery, but still will not be responsible for providing the refund.
NN Publication will be responsible to resend the print copy only and only if the print copy is lost or print copy is damaged in delivery / or there is delay more than 6 months.
According to India Post the delivery should be completed with in 1-3 weeks after dispatch of articles.
Privacy Policy-
NN Publicationl uses the email ids of authors and editors and readers for sending editorial or publication notification only, we do not reveal or sell the email ids to any other website or company.