About cookies on this site Our websites require some cookies to function properly (required). In addition, other cookies may be used with your consent to analyze site usage, improve the user experience and for advertising. For more information, please review your options. By visiting our website, you agree to our processing of information as described in IBM’sprivacy statement. To provide a smooth navigation, your cookie preferences will be shared across the IBM web domains listed here.
Paper
Trusted computing and open source
Abstract
Trusted computing can help defend Linux and other open source operating systems and applications from attack. It can help protect desktop and mobile Linux clients from on-line and off-line integrity and confidentiality attacks. It can measure and remotely attest to the integrity of a system. It can provide authentication mechanisms which are resistant to phishing and pharming attacks. This paper describes the features of Trusted Computing's Trusted Platform Module (TPM), shows how the TPM can provide these protections, and summarizes work in the open source community to implement them. © 2005 Elsevier Ltd. All rights reserved.