کد مقاله کد نشریه سال انتشار مقاله انگلیسی نسخه تمام متن
10342537 696172 2005 15 صفحه PDF دانلود رایگان
عنوان انگلیسی مقاله ISI
Compatibility, competition, and control in trusted computing environments
موضوعات مرتبط
مهندسی و علوم پایه مهندسی کامپیوتر شبکه های کامپیوتری و ارتباطات
پیش نمایش صفحه اول مقاله
Compatibility, competition, and control in trusted computing environments
چکیده انگلیسی
Trusted computing (TC) technologies deployed in the PC platform could shift the balance of power in some on-line interactions away from computer end-users and consumers of information goods and services. This effect occurs when remote attestation features make previously indistinguishable software configurations distinguishable; service and information goods providers can then discriminate against disfavored client software. Network externalities mean that even those who don't opt-in to TC use may still be harmed by widespread TC deployment. These effects might be “defanged” by some technical changes to TC designs.
ناشر
Database: Elsevier - ScienceDirect (ساینس دایرکت)
Journal: Information Security Technical Report - Volume 10, Issue 2, 2005, Pages 105-119
نویسندگان
,