Trusted ← trustworthy ← proof position paper

1Citations
Citations of this article
3Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Trusted computing is important, but we argue that it remains an illusion as long as the underlying trusted computing base (TCB) is not trustworthy. We observe that present approaches to trusted computing do not really address this issue, but are trusting TCBs which have not been shown to deserve this trust. We argue that only mathematical proof can ensure the trustworthiness of the TCB. In short: trust requires trustworthiness, which in turn requires proof. We also show that this is achievable. © 2009 Vieweg+Teubner Verlag | GWV Fachverlage GmbH, Wiesbaden.

Cite

CITATION STYLE

APA

Heiser, G. (2009). Trusted ← trustworthy ← proof position paper. In Future of Trust in Computing: Proceedings of the First International Conference Future of Trust in Computing 2008: With 58 Illustrations (pp. 55–59). Vieweg+Teubner. https://doi.org/10.1007/978-3-8348-9324-6_6

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free