DPA Publication: Security by Design: Trusted Computing

The objective of the paper is to raise awareness of the potential of trusted computing and to provide guidance for procurement and end-to-end lifecycle management of computers for use in environments where confidentiality and integrity are important business requirements. The paper provides a basic understanding of what Trusted Computing is, and in particular the capacity […]