Well, there's always the IBM 4758, which we built as a general-purpose secure computer environment for hostile environments, with the ability for on-device applications to prove to the outside world what they are and where they're running.
IBM's been marketing it primarily as a crypto accelerator, unfortunately. The official product pages make it hard to distinguish the box from the CCA application sw. For basic architecture stuff: S.W. Smith, S.H. Weingart. `Building a High-Performance, Programmable Secure Coprocessor.'' Computer Networks (Special Issue on Computer Network Security.) 31: 831-860. April 1999. For some recent creative applications: S. Jiang, S.W. Smith, K. Minami. ``Securing Web Servers against Insider Attack.'' ACSA/ACM Annual Computer Security Applications Conference. December 2001 A. Iliev, S.W. Smith. Prototyping an Armored Data Vault: Rights Management on Big Brother's Computer. Privacy-Enhancing Technology 2002, Springer-Verlag, to appear. These and more live at: http://www.cs.dartmouth.edu/~sws/papers/ --Sean Prof. Sean W. Smith [EMAIL PROTECTED] http://www.cs.dartmouth.edu/~sws/ (has ssl link to pgp key) Department of Computer Science, Dartmouth College, Hanover NH USA --------------------------------------------------------------------- The Cryptography Mailing List Unsubscribe by sending "unsubscribe cryptography" to [EMAIL PROTECTED]
