50 likes | 169 Views
USC CSci599 Trusted Computing - Lecture Fifteen Wrapping it all together 27 April 2007. Dr. Clifford Neuman University of Southern California Information Sciences Institute. Announcements. Project due today Class evaluation today. The foreseeable future.
E N D
USC CSci599Trusted Computing - Lecture FifteenWrapping it all together27 April 2007 Dr. Clifford Neuman University of Southern California Information Sciences Institute
Announcements • Project due today • Class evaluation today
The foreseeable future • TPM’s introduced to more and more hardware • Applications primarily • Network access control • Digital rights management • Grounding for integrity checks (AV/etc)
Longer Term • Work is needed to address the policy issues of trusted computing • Architectures that leverage TC to better manage federated policies. • There allow “top down” policies in environments where there is no “top down” control. • The TPM becomes the top level authority. • Requires significant confidencein the TPM. • But the TPM doesn’t have to do much.
Current Issues Discussion • Handout of very current news articles and discussion. • MPAA: We are committed to fair sue, interoperability and DRM • Information Week: Endpoint security – 6 questions to ask before you buy • Wave to showcase Next Generation fo Trusted Computing Solutions at Key Industry Tradeshows