How trusted computers can enhance privacy preserving mobile applications
暂无分享,去创建一个
Trusted computing is designed to be a cheap, exportable and ubiquitous way of improving the security of personal, corporate and government data. The paper gives an introduction to how trusted computing can be relevant to mobile and pervasive computing and provides some examples of what can be done to enhance privacy and trust using (extensions of) this technology.
[1] Siani Pearson,et al. Towards accountable management of identity and privacy: sticky policies and enforceable tracing services , 2003, 14th International Workshop on Database and Expert Systems Applications, 2003. Proceedings..
[2] Chris I. Dalton,et al. Dynamic label binding at run-time , 2003, NSPW '03.
[3] Siani Pearson,et al. Trusted Computing: Strengths, Weaknesses and Further Opportunities for Enhancing Privacy , 2005, iTrust.