Trusted Computing: Strengths, Weaknesses and Further Opportunities for Enhancing Privacy.
Siani PearsonPublished in: iTrust (2005)
Keyphrases
- trusted computing
- computing platform
- cloud computing
- computing environments
- computer security
- virtual organization
- privacy preserving
- trusted platform module
- security issues
- personal information
- private information
- privacy protection
- remote attestation
- sensitive information
- parallel computing
- identity management
- privacy policies
- conflict resolution
- sensitive data
- information systems
- computing systems
- distributed computing
- anomaly detection
- data processing
- case study