A note on trust-enhanced security

Vijay Varadharajan*

*Corresponding author for this work

Research output: Contribution to journalArticlepeer-review

21 Citations (Scopus)

Abstract

With our ever-increasing reliance on a digital economy, most business and government activities now depend on networked information systems for their basic operation. Clearly, we're seeing a renewed urgency to get a better handle on capturing and reasoning about trust in computing systems and information services. Even Microsoft has adopted the term trustworthy computing as a company initiative in both its internal software development and its commercial offerings. In this installment of On the Horizon, the author takes a short journey through the concept and evolution of trust in the secure computing technology world, and examines some of the challenges involved in trusted computing today.

Original languageEnglish
Article number5054911
Pages (from-to)57-59
Number of pages3
JournalIEEE Security and Privacy
Volume7
Issue number3
DOIs
Publication statusPublished - May 2009

Fingerprint

Dive into the research topics of 'A note on trust-enhanced security'. Together they form a unique fingerprint.

Cite this