Article ID Journal Published Year Pages File Type
10342536 Information Security Technical Report 2005 9 Pages PDF
Abstract
The intent of trusted computing is to ensure that an information-processing device functions according to expectations. If the device has been designed to offer security protections, then it is reasonable for these expectations to include some assurance that the device will protect the security interests of the device's stakeholders. In the case of mobile phones, there are many different stakeholders that have diverse security interests. This paper discusses stakeholder interests in a mobile phone, describes how those interests are addressed using the Trusted Platform Module (TPM) specified by the Trusted Computing Group (TCG), and explains how improved protections are provided using the Freescale Advanced Trusted Platform (ATP).
Related Topics
Physical Sciences and Engineering Computer Science Computer Networks and Communications
Authors
, , ,