If you are in the Berkeley, CA area tomorrow, this might be a good talk to attend:
http://events.berkeley.edu/index.php/calendar/sn/pubaff.html?event_ID=7376&date=2008-02-28 Trusted computing provides methods for software components to establish confidence in the code with which they communicate. Such technologies are often used to support digital rights management and other mechanisms that protect service providers and owners of content. The same underlying mechanisms, however, can be used to protect the users from untrustworthy service providers. Providing strong security for future systems requires a clearer understanding of the protection boundaries to be enforced. While trusted Computing can help enforce such boundaries, little work has been done to help us understand the structure of such boundaries. This talk discusses ongoing work to develop trusted computing architectures that support multiple perspectives on trust. For users, the most trusted components are their own systems; the software from service providers is less trusted. Information providers place greater confidence in vetted code that runs on designated trusted computing hardware. The trusted computing reference monitor mediates requirements and obligations for each software component providing mutual protection to all involved. http://events.berkeley.edu/index.php/calendar/sn/pubaff.html?event_ID=7376&date=2008-02-28
_______________________________________________ FDE mailing list [email protected] http://www.xml-dev.com/mailman/listinfo/fde
