Concern about vulnerabilities of IT systems is growing together with attention to risks of intrusive cyber-control over personal activities and data. This article discusses some new technologies that are being integrated into computing devices for realizing so-called Trusted Computing and Digital Rights Management systems, which can remotely attest their current hardware/software state and can enforce external policies to access protected content. These technologies are then confronted with distributed Trust Management systems, which realize access control for local resources on the basis of delegation of access rights according to local trust decisions. Both technologies are discussed from various points of view: architecture, vision, ethics, politics and law.

Trust Enforcing and Trust Building, Different Technologies and Visions / Tomaiuolo, Michele. - In: INTERNATIONAL JOURNAL OF CYBER WARFARE AND TERRORISM. - ISSN 1947-3435. - 2:4(2012), pp. 49-66. [10.4018/ijcwt.2012100104]

Trust Enforcing and Trust Building, Different Technologies and Visions

TOMAIUOLO, Michele
2012-01-01

Abstract

Concern about vulnerabilities of IT systems is growing together with attention to risks of intrusive cyber-control over personal activities and data. This article discusses some new technologies that are being integrated into computing devices for realizing so-called Trusted Computing and Digital Rights Management systems, which can remotely attest their current hardware/software state and can enforce external policies to access protected content. These technologies are then confronted with distributed Trust Management systems, which realize access control for local resources on the basis of delegation of access rights according to local trust decisions. Both technologies are discussed from various points of view: architecture, vision, ethics, politics and law.
2012
Trust Enforcing and Trust Building, Different Technologies and Visions / Tomaiuolo, Michele. - In: INTERNATIONAL JOURNAL OF CYBER WARFARE AND TERRORISM. - ISSN 1947-3435. - 2:4(2012), pp. 49-66. [10.4018/ijcwt.2012100104]
File in questo prodotto:
File Dimensione Formato  
Trust-Enforcing-and-Trust-Building-Different-Technologies-and-Visions.pdf

non disponibili

Tipologia: Documento in Post-print
Licenza: NON PUBBLICO - Accesso privato/ristretto
Dimensione 1.51 MB
Formato Adobe PDF
1.51 MB Adobe PDF   Visualizza/Apri   Richiedi una copia
2012-ijcwt-tomaiuolo.pdf

non disponibili

Tipologia: Documento in Pre-print
Licenza: Creative commons
Dimensione 507.91 kB
Formato Adobe PDF
507.91 kB Adobe PDF   Visualizza/Apri   Richiedi una copia

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/11381/2688891
Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus ND
  • ???jsp.display-item.citation.isi??? ND
social impact