Trusted Computing and Digital Rights Management Clearinghouse
digital rights management
MetadataShow full item record
Publisher:The Ohio State University
Series/Report no.:The Ohio State University. Department of Computer Science and Engineering Honors Theses; 2007
Presently, security threats from computer viruses to malicious intrusion imperil computer users. To mitigate and counter these threats, a consortium of hardware and software vendors and consumer-electronics manufacturers are implementing “trusted computing” (TC) standards on present and future computer systems. These standards define security policies that can defend computer systems against attacks. However, in their zeal to protect intellectual property, the content and computer industries plan to use TC technologies in ways that will likely infringe upon users’ civil liberties and hamper innovation. Here, details of these technologies and their uses and misuses are explained. An overview of technologies on which TC depends is presented, followed by an explanation of exactly what TC is. Interactions between TC-supported computer hardware, operating systems, and software are explored, as are the potential impacts on civil liberties and the economy. Finally, present and future TC computer systems are analyzed and reasonable policy suggestions are offered. Advisor: Bruce Weide
The Ohio State University Undergraduate Research Scholarship
Items in Knowledge Bank are protected by copyright, with all rights reserved, unless otherwise indicated.