A Critical Comparison of Trusted Computing and Trust Management Technologies