A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2019; you can also visit the original URL.
The file type is application/pdf
.
Trusted Computing, Trusted Third Parties, and Verified Communications
[chapter]
2004
Security and Protection in Information Processing Systems
Trusted Computing gives rise to a new supply of trusted third parties on which distributed systems can potentially rely. They are the secure system components (hardware and software) built into nodes with Trusted Computing capabilities . These trusted third parties may be used for supporting communications in distributed systems. In particular, a trusted third party can check and certify the data sent from anode A to anode B, so that B can have some confidence in the properties of the data
doi:10.1007/1-4020-8143-x_19
dblp:conf/sec/Abadi04
fatcat:ebhxhtdavjdvbbguowl57nowey