1st International ICST Conference on Communication System Software and MiddleWare

Research Article

Protected Computing vs. Trusted Computing

  • @INPROCEEDINGS{10.1109/COMSWA.2006.1665152,
        author={Antonio  Ma\`{o}a and Antonio   Mu\`{o}oz},
        title={Protected Computing vs. Trusted Computing},
        proceedings={1st International ICST Conference on Communication System Software and MiddleWare},
        publisher={IEEE},
        proceedings_a={COMSWARE},
        year={2006},
        month={8},
        keywords={},
        doi={10.1109/COMSWA.2006.1665152}
    }
    
  • Antonio Maña
    Antonio Muñoz
    Year: 2006
    Protected Computing vs. Trusted Computing
    COMSWARE
    IEEE
    DOI: 10.1109/COMSWA.2006.1665152
Antonio Maña1,2, Antonio Muñoz1,2
  • 1: Computer Science Department
  • 2: University of Málaga, 29071 Málaga, Spain

Abstract

The trusted computing initiative represents an important effort towards more secure and dependable computers and therefore towards the security of all computer-supported infrastructures and processes. However, the trusted computing paradigm entails some risks and drawbacks that are by no means negligible. In this paper we introduce the concept of protected computing as an alternative to trusted computing and compare these approaches from the points of view of security, usability, applications and convenience for users. Finally we also show how protected computing can represent an interesting complement to trusted computing