Trusted computing, trusted third parties, and verified communications

9Citations
Citations of this article
13Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

Trusted Computing gives rise to a new supply of trusted third parties on which distributed systems can potentially rely. They are the secure system components (hardware and software) built into nodes with Trusted Computing capabilities. These trusted third parties may be used for supporting communications in distributed systems. In particular, a trusted third party can check and certify the data sent from a node A to a node B, so that B can have some confidence in the properties of the data despite A's possible incompetence or malice. We present and explore this application of Trusted Computing, both in general and in specific instantiations. © 2004 by Springer Science+Business Media Dordrecht.

Cite

CITATION STYLE

APA

Abadi, M. (2004). Trusted computing, trusted third parties, and verified communications. In IFIP Advances in Information and Communication Technology (Vol. 147, pp. 291–308). Springer New York LLC. https://doi.org/10.1007/1-4020-8143-x_19

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free