Technology developed and promoted by the Trusted Computing Group
Not to be confused with Trusted computing base or Trustworthy computing.
Trusted Computing (TC) is a technology developed and promoted by the Trusted Computing Group.[1] The term is taken from the field of trusted systems and has a specialized meaning that is distinct from the field of confidential computing.[2] With Trusted Computing, the computer will consistently behave in expected ways, and those behaviors will be enforced by computer hardware and software.[1] Enforcing this behavior is achieved by loading the hardware with a unique encryption key that is inaccessible to the rest of the system and the owner.
TC is controversial as the hardware is not only secured for its owner, but also against its owner, leading opponents of the technology like free software activist Richard Stallman to deride it as "treacherous computing",[3][4] and certain scholarly articles to use scare quotes when referring to the technology.[5][6]
Trusted Computing proponents such as International Data Corporation,[7] the Enterprise Strategy Group[8] and Endpoint Technologies Associates[9] state that the technology will make computers safer, less prone to viruses and malware, and thus more reliable from an end-user perspective. They also state that Trusted Computing will allow computers and servers to offer improved computer security over that which is currently available. Opponents often state that this technology will be used primarily to enforce digital rights management policies (imposed restrictions to the owner) and not to increase computer security.[3][10]: 23
Chip manufacturers Intel and AMD, hardware manufacturers such as HP and Dell, and operating system providers such as Microsoft include Trusted Computing in their products if enabled.[11][12] The U.S. Army requires that every new PC it purchases comes with a Trusted Platform Module (TPM).[13][14] As of July 3, 2007, so does virtually the entire United States Department of Defense.[15]
^ abChris Mitchell (2005). Trusted Computing. IET. ISBN 978-0-86341-525-8.
^"What is the Confidential Computing Consortium?". Confidential Computing Consortium. Retrieved 20 May 2022.
^ abStallman, Richard. "Can You Trust Your Computer?". gnu.org. Retrieved 12 August 2013.
^scl-paullauria (2017-01-23). "Trust me, I'm a computer". Society for Computers & Law. Retrieved 2024-04-03.
^Anderson, Ross (November 15, 2004). Camp, L. Jean; Lewis, Stephen (eds.). Cryptography and Competition Policy - Issues with 'Trusted Computing', in Economics of Information Security. Vol. 12. Springer US. pp. 35–52. doi:10.1007/1-4020-8090-5_3 – via Springer Link.
^"F. Stajano, "Security for whom? The shifting security assumptions of pervasive computing", Lecture notes in computer science, vol. 2609, pp. 16-27, 2003" (PDF).
^Rau, Shane (February 2006). "The Trusted Computing Platform Emerges as Industry's First Comprehensive Approach to IT Security" (PDF). IDC Executive Brief. International Data Corporation. Retrieved 2007-02-07.
^Oltsik, Jon (January 2006). "Trusted Enterprise Security: How the Trusted Computing Group (TCG) Will Advance Enterprise Security" (PDF). White Paper. Enterprise Strategy Group. Retrieved 2007-02-07.
^Kay, Roger L. (2006). "How to Implement Trusted Computing: A Guide to Tighter Enterprise Security" (PDF). Endpoint Technologies Associates. Retrieved 2007-02-07.
^Cite error: The named reference Anderson was invoked but never defined (see the help page).
^"Enhancing IT Security with Trusted Computing Group standards" (PDF). Dell Power Solutions. November 2006. p. 14. Retrieved 2006-02-07. TPMs [Trusted Platform Modules] from various semiconductor vendors are included on enterprise desktop and notebook systems from Dell and other vendors
^"Trusted Platform Module Services in Windows Vista". Windows Hardware Development Central. Microsoft. 2005-04-25. Archived from the original on 2007-05-15. Retrieved 2007-02-07. Windows Vista provides a set of services for applications that use TPM technologies.
^Lemos, Robert (2006-07-28). "U.S. Army requires trusted computing". Security Focus. Retrieved 2007-02-07.
^"Army CIO/G-6 500-day plan" (PDF). U.S. Army. October 2006. Retrieved 2007-02-07. Strategic goal n. 3, 'deliver a joint netcentric information that enables warfighter decision superiority'
^encryption of unclassified data Archived 2007-09-27 at the Wayback Machine
against firmware attacks. Trusted Platform Module (TPM) was conceived by a computer industry consortium called TrustedComputing Group (TCG). It evolved...
enable trusted computing features in computers and mobile devices. Related efforts involved Trusted Network Connect, to bring trustedcomputing to network...
secure upgrades of the trustedcomputing base poses bootstrap problems of its own. As stated above, trust in the trustedcomputing base is required to make...
secure multi-party computation, and TrustedComputing. Confidential computing is promoted by the Confidential Computing Consortium (CCC) industry group,...
authentic operating system starts in a trusted environment, which can then be considered trusted. Provision of a trusted operating system with additional security...
In computing, a trusted client is a device or program controlled by the user of a service, but with restrictions designed to prevent its use in ways not...
trusted system is one that is relied upon to a specified extent to enforce a specified security policy. This is equivalent to saying that a trusted system...
The term Trustworthy Computing (TwC) has been applied to computing systems that are inherently secure, available, and reliable. It is particularly associated...
provers. The implementation of the underlying ML compiler adds to the trustedcomputing base. Work on CakeML resulted in a formally verified ML compiler,...
based on ARM TrustZone technology, conforming to the TR1 standard, were later launched, such as Trusted Foundations developed by Trusted Logic. Work on...
In information security, computational trust is the generation of trusted authorities or user trust through cryptography. In centralised systems, security...
verification methods where feasible. Trusted Design Environment is where the TCB is designed in a trusted facility with only trusted (cleared) personnel. The publication...
received from any non-trusted source, like any peer in the P2P network. Then, the received hash tree is checked against the trusted top hash, and if the...
security related bugs. It is based on the classical spiral model. Trustedcomputing base Howard, Michael; Lipner, Steve (June 2006). The Security Development...
complex as well as error-prone. The Trusted Computer System Evaluation Criteria (TCSEC) concept of trustedcomputing base (TCB) minimization is a far more...
Kingdom independent charity TrustedComputing Platform Alliance, former computer industry group succeeded by the TrustedComputing Group This disambiguation...
self-encrypting drives (SED). The specification is published by the TrustedComputing Group Storage Workgroup. The Opal SSC (Security Subsystem Class) is...
Trusted Network Connect (TNC) is an open architecture for Network Access Control, promulgated by the Trusted Network Connect Work Group (TNC-WG) of the...
on a phone using letters and symbols Trusted Execution Technology, Intel's implementation of TrustedComputing TXT records, a type of Domain Name System...
intended to ensure that only trusted software and hardware can be used while still retaining flexibility. A chain of trust is designed to allow multiple...
Inouye (D-HI) Bill Nelson (D-FL) Ted Stevens (R-AK) TrustedComputingTrustedComputing Group Trusted Platform Module 107th Congress, 2nd session, S. 2048...
original on June 11, 2014. Retrieved December 18, 2013. Autonomic and TrustedComputing: 4th International Conference (Google Books). ATC. 2007. ISBN 9783540735465...
Telecine machine Teleconference TrueCrypt, a disk encryption software TrustedComputing, a scheme for adding additional controls on what computers may or...