EconPapers    
Economics at your fingertips  
 

A Critical Comparison of Trusted Computing and Trust Management Technologies

Michele Tomaiuolo
Additional contact information
Michele Tomaiuolo: Department of Information Engineering, University of Parma, Parma, Italy

International Journal of Cyber Warfare and Terrorism (IJCWT), 2014, vol. 4, issue 4, 64-81

Abstract: Mainly justified by the growing concern about vulnerabilities of IT systems, some new technologies are being integrated into computing devices, for realizing so-called Trusted Computing systems. However, they are raising questions about intrusive cyber-control over individual user activities and data, but also about consequences in cyber-war scenarios. The aim of this article is to confront Trusted Computing systems with distributed Trust Management systems, which realize access control for local resources on the basis of delegation of access rights, according to local trust decisions. Both technologies are discussed from various points of view: architecture, vision, ethics, politics and law. Some experimentations are also presented, to show the applicability of Trust Management techniques to modern Service-Oriented Architectures.

Date: 2014
References: Add references at CitEc
Citations: Track citations by RSS feed

Downloads: (external link)
http://services.igi-global.com/resolvedoi/resolve. ... 018/ijcwt.2014100105 (application/pdf)

Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.

Export reference: BibTeX RIS (EndNote, ProCite, RefMan) HTML/Text

Persistent link: https://EconPapers.repec.org/RePEc:igg:jcwt00:v:4:y:2014:i:4:p:64-81

Access Statistics for this article

More articles in International Journal of Cyber Warfare and Terrorism (IJCWT) from IGI Global
Bibliographic data for series maintained by Journal Editor ().

 
Page updated 2019-11-24
Handle: RePEc:igg:jcwt00:v:4:y:2014:i:4:p:64-81