Concern about vulnerabilities of IT systems is growing together with attention to risks of intrusive cyber-control over personal activities and data. This article discusses some new technologies that are being integrated into computing devices for realizing so-called Trusted Computing and Digital Rights Management systems, which can remotely attest their current hardware/software state and can enforce external policies to access protected content. These technologies are then confronted with distributed Trust Management systems, which realize access control for local resources on the basis of delegation of access rights according to local trust decisions. Both technologies are discussed from various points of view: architecture, vision, ethics, politics and law.
Trust Enforcing and Trust Building, Different Technologies and Visions / Michele Tomaiuolo. - In: INTERNATIONAL JOURNAL OF CYBER WARFARE AND TERRORISM. - ISSN 1947-3435. - 2:4(2012), pp. 49-66. [10.4018/ijcwt.2012100104]
|Tipologia ministeriale:||Articolo su rivista|
|Appare nelle tipologie:||1.1 Articolo su rivista|
File in questo prodotto:
|Trust-Enforcing-and-Trust-Building-Different-Technologies-and-Visions.pdf||Documento in Post-print||NON PUBBLICO - Accesso privato/ristretto||Administrator Richiedi una copia|
|2012-ijcwt-tomaiuolo.pdf||Documento in Pre-print||Administrator Richiedi una copia|