Editorial : Protecting private and corporate PCs
نویسندگان
چکیده
The OpenTC consortium’s first prototype was described in the January 2008 issue of the OpenTC newsletter. It essentially comprised a hypervisor with a compartment for carrying out Private Electronic Transactions (PET). The compartment sand-boxed a browser for conducting authorized transactions such as a bank transfer. By isolating that compartment from other compartments used for daily operations such as general web-surfing, and by employing remote attestation, we demonstrated that Trusted Computing (TC) can be used to provide improved protection against attacks such as phishing.
منابع مشابه
The Role of Corporate Governance in improving the Regulatory Ranking of Iranian Private Banks
The health of a bank helps to maintain the trust and confidence of the bank and also the interests of the beneficiaries. But balancing the interests of all stakeholders requires improving corporate governance in banks. Given the importance of the issue, this paper examines the effect of corporate governance on bankschr('39') regulatory rankings. For this purpose, the required criteria have been...
متن کاملQuestions and Answers About Genetically Modified Crops: A Pocketful of Information Genetically Modified Crops– Take Part in the Dialogue Global agriculture finds itself engrossed in a heated debate over genetically modified (GM)
Global agriculture finds itself engrossed in a heated debate over genetically modified (GM) crops. This debate, which features science, economics, politics, and even religion, is taking place almost everywhere. It is going on in research labs, corporate boardrooms, legislative chambers, newspaper editorial offices, religious institutions, schools, supermarkets, coffee shops, and even in private...
متن کاملThe View from 30, 000 Feet
By the time you read this editorial, I will have returned from the American Dental Hygienists' Association (ADHA) Annual Session in Albuquerque, NM. I have never been to Albuquerque, but when I think of the city, I think of hot air balloons. It amazes me to think of the heights the balloons can reach and the view the passengers can see when they look down and across the landscape at several hun...
متن کاملA System for Protecting Crutial Things *
Today’s critical infrastructures like the Power Grid are essentially physical processes controlled by computers connected by networks. Once these systems were highly isolated and secure against most security threats. However, in recent years they evolved in several aspects that greatly increased their exposure to cyber-attacks coming from the Internet. Firstly, the computers, networks and proto...
متن کاملAnalyzing the Ethical Dilemma between Protecting Consumer Privacy and Marketing Customer Data
Rapid transformation in marketing information technologies has enabled corporations to build ample consumer databases and analyze those using sophisticated data-mining techniques to obtain extensive knowledge about those consumers’ personal life styles and private matters. Considering that the United States Federal Trade Commission (FTC) has relied on fair information principles to guide privac...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2008