Key Concepts
Trusted Computing encompasses six key technology concepts, of which all are required for a fully Trusted system, that is, a system compliant to the TCG specifications:
- Endorsement key
- Secure input and output
- Memory curtaining / protected execution
- Sealed storage
- Remote attestation
- Trusted Third Party (TTP)
Read more about this topic: Trusted Computing
Famous quotes containing the words key and/or concepts:
“You have many choices. You can choose forgiveness over revenge, joy over despair. You can choose action over apathy.... You hold the key to how well you make the emotional adjustment to your divorce and consequently how well your children will adapt.”
—Stephanie Marston (20th century)
“Institutional psychiatry is a continuation of the Inquisition. All that has really changed is the vocabulary and the social style. The vocabulary conforms to the intellectual expectations of our age: it is a pseudo-medical jargon that parodies the concepts of science. The social style conforms to the political expectations of our age: it is a pseudo-liberal social movement that parodies the ideals of freedom and rationality.”
—Thomas Szasz (b. 1920)