Trust computing - Essay Example

Comments (0) Cite this document
Machine authentication in a trusted computing system utilizes machine credentials such as machine name and machine certificate or password to authenticate the endpoint. Organizations have a mandate of controlling individuals who are able to access resources and corporate…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER93.6% of users find it useful
Trust computing
Read TextPreview

Extract of sample "Trust computing"

Machine authentication By Machine authentication in a trusted computing system utilizes machine credentials such as machine name and machine certificate or password to authenticate the endpoint. Organizations have a mandate of controlling individuals who are able to access resources and corporate networks. They also control and identify which servers and machines are to be accessed. Implementation of machine authentication ensures that only machines with credentials that are considered appropriate can operate, communicate and access corporate networks. Machine authentication offers organizations a cost effective and easier way for accessing and securing organizational data. One of the benefit of machine authentication is that it enables information within the active directory to issue optionally configured and template based certificate automatically to all servers and machines residing within a multiple or single domains in a multiple or single forest configuration ( sun et al, 2012).
Other benefits of machine authentication entails preventing rogue machines from accessing organizational resources and networks, allowing mutual server and machine authentication between the various machines, being scalable and cost effective for organizations of all sizes and identifying the servers and machines having access to various networks. Machine authentication enables users to possess a log on script (Anwander et al, 2013). The experience is often transparent as the log in process is performed in the normal way. It also ensures automatic issuance and enrollment of certificates. Computer or machine authentication takes place before windows can display the CTRL + ALT + DEL screen. It does not occur when members of organization utilize their domain credentials on their own computers or other window devices. Implementation of machine authentication will enable organizations to have control over access to resources.
Anwander, M., Braun, T., Hurni, P., Staub, T., & Wagenknecht, G. 2013. User and Machine Authentication and Authorization Infrastructure for Distributed Wireless Sensor Network Testbeds. JSAN, 2(1), 109-121. doi:10.3390/jsan2010109
Sun, X., Men, S., Zhao, C., & Zhou, Z. 2012. A security authentication scheme in machine-to-machine home network service. Security Comm. Networks, n/a-n/a. doi:10.1002/sec.551 Read More
Cite this document
  • APA
  • MLA
(“Trust computing Essay Example | Topics and Well Written Essays - 250 words”, n.d.)
Trust computing Essay Example | Topics and Well Written Essays - 250 words. Retrieved from
(Trust Computing Essay Example | Topics and Well Written Essays - 250 Words)
Trust Computing Essay Example | Topics and Well Written Essays - 250 Words.
“Trust Computing Essay Example | Topics and Well Written Essays - 250 Words”, n.d.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document


Trust Agent

...Book Report/Review, Journalism, mass media and communication Topic: Trust Agents: Using the Web toBuild Influence, Improve Reputation, and Earn Trust In your own words, what is a Trust Agent? Trust Agent is a new incarnation of the Public Relations Manager. Whereas the Public Relations Manager has the role within the specified area with pre-assigned responsibilities, the influence of Trust Agents grows in all the directions like the octopus. People tend to believe their own social circles because they have built it assiduously brick by brick. They trust the individuals within the network and they know the process through which each...
6 Pages(1500 words)Book Report/Review


...that enables convenience on the demand network access to the shared computing resources. As stated by Amarnath et. al.2010 virtualization technology is used to optimize the performance of the application in a cost effective way but this technology can introduce some security risks. Therefore, cloud computing security plays a major role because the customers outsource computation tasks and data on cloud computing servers which are managed by cloud providers who cannot be trusted (Amarnath, 2010). Cloud computing has become popular as a result of many enterprise applications moving to the cloud platforms. However, the issue of security has...
5 Pages(1250 words)Essay


...Many tools are available to monitor and control large IT projects. They are project selection and reselection, project scheduling, estimating, and budgeting, planning, project team management and selection, stakeholder management, management support, procurement management, learning and knowledge management, and risk management. Project selection and reselection is one of the tools in the monitoring and control of large IT projects. Although Yetton (2000) uses this as an indication of how successful projects have been monitored and controlled, several other scholars (Cai et al., p. 1-22) use it as an independent variable. Project selection is the procedure of approving or rejecting projects. Project benefits are weighted... tools are...
6 Pages(1500 words)Assignment

Express Trust

...Express Trust (Equity and Trusts) Fiduciary Principle Question: What is the fiduciary principle What is its basis What is its relationship to express trusts Answer: The fiduciary principle comes from the "term fiduciary itself is derived from the Latin fiduciarius, meaning 'faithful'." (Hudson 2008) It is a characteristic that covers certain relationships and it integrates into those relationships good faith, loyalty, confidence and legal obligation to uphold the purpose of that certain relationship. The fiduciary principle is fundamentally based on common or communally accepted good that is morally binding on the direct participants in a relationship. This greater value in society is...
4 Pages(1000 words)Essay

Discretionary Trust

...There is no reason why the test for certainty of objects in the case of discretionary trusts should be any different from the test for certainty of objects - Re Baden's Trust: A trust is a tool of equity to ensure that the intention of the creator of the trust is fulfilled and in the case of constructive trusts the courts use this tool to ensure that justice is fulfilled. The problem that the law commission is discussing refers to the formalities that surround the creation of trusts, disposition of equitable interests and transfer of certain types of trust property that sometimes causes uncertainty of law and/or inequity to happen. This will be seen in this discussion, which will explore the formalities that surround trusts... and then the...
14 Pages(3500 words)Essay


... ComputingComputability Theory The field of computer science deals with the idea of computability theory which looks at mathematical and logical problems by examining their solvability. In essence it examines if a problem can be positively handled by a logic machine or not. In even simpler terms, computability theory works at the very limits of computing power so while we can expect computers today to be very powerful and complex machines; there are certain limits to the problems they can solve. In certain situations, computability theory suggests that specialized computers might be...
9 Pages(2250 words)Essay


...Running Head: Trust Trust s Trust Research Exercises Given the global economic downturn that has affected corporations worldwide, companies have had to make many tough decisions in order to continue staying in business. This has caused many hard feelings amongst employees of companies; who take it as a slap in the face after all the many years of working loyally and hard for a corporation. Also, the uncertainty has left many employees racked with nervous qualms, wondering if they will be the next ones to get fired. Given the world statistics on whether citizens truly trust their companies, surprising results have been unearthed. Citizens in Canada and South Africa...
8 Pages(2000 words)Essay


...; employed for voice communication as well as TV, correspondingly. Fiber optics based communication and transmission medium engages installing the entire new fiber optic cables, complete set of little fibers of glass, consequently DSL is possible to be the existing choice for the majority informal Internet clients intended for a number of periods (Hintzr, 2010; Nash, 2000; Shelly et al., 2005). 6.3- Equipment and Installation Together DSL, communication and transmission medium normally utilize a modem or else router to interface through computers as well as additional Internet devices. DSL as well necessitates that voice devices in the home areas be ended by diverse filters to stop their dawdling the fastest DSL...
12 Pages(3000 words)Essay


...The LZ encoding was developed in 1984 and has been identified as simple to implement due to its compatibility with hardware. Its purpose is to compress large English language documents. The encoding has been used in PDF files and allows the reduction of the size of a document. The compiler can be said to be a program used in the translation of computer language (Layton, 2007). It simplifies the original language of information into another language, normally easy to understand. An example of a compiler is the JAVA software. Applications software is a class of software used to perform a specified function. An office suite is an application used for editing written documents. Another example is a media player whose...
2 Pages(500 words)Coursework


...Client’s 4 March Trust is a very broad term; different people would have different definitions for this word. It is an act which is both emotional as well as logical. A person becomes extremely vulnerable when he trusts another person, this is the emotional side which gets displayed. Logic comes into play when a person is confident that the other person will not take advantage of his situation. This is both logical and emotional, trusting another person has become really difficult because most people do not keep their promises and also try and take advantage of the situation hence disturbing the person who had trusted the other person emotionally. “Emotions associated with trust include companionship, friendship, love, agreement... ,...
1 Pages(250 words)Research Paper
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Essay on topic Trust computing for FREE!

Contact Us