A Critical Comparison of Trusted Computing and Trust Management Technologies

A Critical Comparison of Trusted Computing and Trust Management Technologies

Michele Tomaiuolo
Copyright: © 2014 |Volume: 4 |Issue: 4 |Pages: 18
ISSN: 1947-3435|EISSN: 1947-3443|EISBN13: 9781466653467|DOI: 10.4018/ijcwt.2014100105
Cite Article Cite Article

MLA

Tomaiuolo, Michele. "A Critical Comparison of Trusted Computing and Trust Management Technologies." IJCWT vol.4, no.4 2014: pp.64-81. http://doi.org/10.4018/ijcwt.2014100105

APA

Tomaiuolo, M. (2014). A Critical Comparison of Trusted Computing and Trust Management Technologies. International Journal of Cyber Warfare and Terrorism (IJCWT), 4(4), 64-81. http://doi.org/10.4018/ijcwt.2014100105

Chicago

Tomaiuolo, Michele. "A Critical Comparison of Trusted Computing and Trust Management Technologies," International Journal of Cyber Warfare and Terrorism (IJCWT) 4, no.4: 64-81. http://doi.org/10.4018/ijcwt.2014100105

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

Mainly justified by the growing concern about vulnerabilities of IT systems, some new technologies are being integrated into computing devices, for realizing so-called Trusted Computing systems. However, they are raising questions about intrusive cyber-control over individual user activities and data, but also about consequences in cyber-war scenarios. The aim of this article is to confront Trusted Computing systems with distributed Trust Management systems, which realize access control for local resources on the basis of delegation of access rights, according to local trust decisions. Both technologies are discussed from various points of view: architecture, vision, ethics, politics and law. Some experimentations are also presented, to show the applicability of Trust Management techniques to modern Service-Oriented Architectures.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.