首页> 外文期刊>International Journal of Cyber Warfare and Terrorism >Trust Enforcing and Trust Building, Different Technologies and Visions
【24h】

Trust Enforcing and Trust Building, Different Technologies and Visions

机译:信任执行与信任建立,不同的技术和愿景

获取原文
获取原文并翻译 | 示例
           

摘要

Concern about vulnerabilities of IT systems is growing together with attention to risks of intrusive cyber-control over personal activities and data. This article discusses some new technologies that are being integrated into computing devices for realizing so-called Trusted Computing and Digital Rights Management systems, which can remotely attest their current hardware/software state and can enforce external policies to access protected content. These technologies are then confronted with distributed Trust Management systems, which realize access control for local resources on the basis of delegation of access rights according to local trust decisions. Both technologies are discussed from various points of view: architecture, vision, ethics, politics and law.
机译:人们越来越关注IT系统的漏洞,并且越来越关注对个人活动和数据进行侵入式网络控制的风险。本文讨论了一些新技术,这些新技术已集成到计算设备中,以实现所谓的“可信计算和数字版权管理”系统,这些系统可以远程证明其当前的硬件/软件状态,并可以强制执行外部策略以访问受保护的内容。这些技术然后面对分布式信任管理系统,该系统基于根据本地信任决策的访问权限的委派实现对本地资源的访问控制。会从不同的角度讨论这两种技术:体系结构,愿景,道德,政治和法律。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号