Research Article
Protected Computing vs. Trusted Computing
@INPROCEEDINGS{10.1109/COMSWA.2006.1665152, author={Antonio Ma\`{o}a and Antonio Mu\`{o}oz}, title={Protected Computing vs. Trusted Computing}, proceedings={1st International ICST Conference on Communication System Software and MiddleWare}, publisher={IEEE}, proceedings_a={COMSWARE}, year={2006}, month={8}, keywords={}, doi={10.1109/COMSWA.2006.1665152} }
- Antonio Maña
Antonio Muñoz
Year: 2006
Protected Computing vs. Trusted Computing
COMSWARE
IEEE
DOI: 10.1109/COMSWA.2006.1665152
Abstract
The trusted computing initiative represents an important effort towards more secure and dependable computers and therefore towards the security of all computer-supported infrastructures and processes. However, the trusted computing paradigm entails some risks and drawbacks that are by no means negligible. In this paper we introduce the concept of protected computing as an alternative to trusted computing and compare these approaches from the points of view of security, usability, applications and convenience for users. Finally we also show how protected computing can represent an interesting complement to trusted computing
Copyright © 2006–2024 IEEE