Jump to ContentJump to Main Navigation
World Wide ResearchReshaping the Sciences and Humanities$
Users without a subscription are not able to see the full content.

William H. Dutton and Paul W. Jeffreys

Print publication date: 2010

Print ISBN-13: 9780262014397

Published to MIT Press Scholarship Online: August 2013

DOI: 10.7551/mitpress/9780262014397.001.0001

Show Summary Details
Page of

PRINTED FROM MIT PRESS SCHOLARSHIP ONLINE (www.mitpress.universitypressscholarship.com). (c) Copyright The MIT Press, 2022. All Rights Reserved. An individual user may print out a PDF of a single chapter of a monograph in MITSO for personal use.date: 27 June 2022

5.1 Trusted Computing Platforms

5.1 Trusted Computing Platforms

(p.153) 5.1 Trusted Computing Platforms
World Wide Research

Andrew Martin

The MIT Press

Internet-enabled technologies and tools have major security weaknesses that put the take-up of distributed computing at risk. Boundary protections, including firewalls that filter and guard against intruders, have been created to address these vulnerabilities. However, this approach has many flaws that make the idea of a “safe zone” almost untenable, especially in the field of e-Research. This chapter looks at sustainable ways of building trust in e-Research systems by developing a more trustworthy computing architecture. It also explains how trusted computing technologies might work.

Keywords:   e-Research, security, trust, computing architecture, safe zone, firewalls

MIT Press Scholarship Online requires a subscription or purchase to access the full text of books within the service. Public users can however freely search the site and view the abstracts and keywords for each book and chapter.

Please, subscribe or login to access full text content.

If you think you should have access to this title, please contact your librarian.

To troubleshoot, please check our FAQs, and if you can't find the answer there, please contact us.