{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,27]],"date-time":"2025-05-27T18:10:03Z","timestamp":1748369403388,"version":"3.41.0"},"reference-count":82,"publisher":"IGI Global","issue":"4","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,10,1]]},"abstract":"<p>Mainly justified by the growing concern about vulnerabilities of IT systems, some new technologies are being integrated into computing devices, for realizing so-called Trusted Computing systems. However, they are raising questions about intrusive cyber-control over individual user activities and data, but also about consequences in cyber-war scenarios. The aim of this article is to confront Trusted Computing systems with distributed Trust Management systems, which realize access control for local resources on the basis of delegation of access rights, according to local trust decisions. Both technologies are discussed from various points of view: architecture, vision, ethics, politics and law. Some experimentations are also presented, to show the applicability of Trust Management techniques to modern Service-Oriented Architectures.<\/p>","DOI":"10.4018\/ijcwt.2014100105","type":"journal-article","created":{"date-parts":[[2015,4,29]],"date-time":"2015-04-29T13:29:25Z","timestamp":1430314165000},"page":"64-81","source":"Crossref","is-referenced-by-count":0,"title":["A Critical Comparison of Trusted Computing and Trust Management Technologies"],"prefix":"10.4018","volume":"4","author":[{"given":"Michele","family":"Tomaiuolo","sequence":"first","affiliation":[{"name":"Department of Information Engineering, University of Parma, Parma, Italy"}]}],"member":"2432","reference":[{"key":"ijcwt.2014100105-0","article-title":"Trust Negotiation for Automated Service Integration.","author":"F.Agazzi","year":"2013","journal-title":"Proceedings of the 14th Workshop on Objects and Agents"},{"key":"ijcwt.2014100105-1","unstructured":"Agazzi, F., and Tomaiuolo, M. (2014). A service-based testbed for Trust Negotiation. SCS M&S Magazine, 4(3), 65-76."},{"key":"ijcwt.2014100105-2","unstructured":"Anderson, A., & Lockhart, H. (2004). SAML 2.0 profile of XACML. Retrieved 2013-08-05 from http:\/\/docs.oasis-open.org\/xacml\/access_control-xacml-2.0-saml_profile-spec-cd-02.pdf"},{"key":"ijcwt.2014100105-3","doi-asserted-by":"publisher","DOI":"10.1145\/872035.872036"},{"key":"ijcwt.2014100105-4","unstructured":"Anderson, R. (2003). Trusted Computing Frequently Asked Questions. Version 1.1. Retrieved 2013-08-05 from http:\/\/www.cl.cam.ac.uk\/~rja14\/tcpa-faq.html"},{"key":"ijcwt.2014100105-5","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2002.1023792"},{"key":"ijcwt.2014100105-6","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.1997.601317"},{"key":"ijcwt.2014100105-7","doi-asserted-by":"publisher","DOI":"10.1016\/S1363-4127(00)87631-1"},{"key":"ijcwt.2014100105-8","first-page":"180","article-title":"Secret Handshakes from Pairing-Based Key Agreements.","author":"D.Balfanz","year":"2003","journal-title":"IEEE Symposium on Security and Privacy"},{"key":"ijcwt.2014100105-9","doi-asserted-by":"crossref","unstructured":"Balfe, S., Lakhani, A. D., & Paterson, K. G. (2005, August). Trusted computing: Providing security for peer-to-peer networks. In Peer-to-Peer Computing, 2005. P2P 2005. Fifth IEEE International Conference on (pp. 117-124). IEEE.","DOI":"10.1109\/P2P.2005.40"},{"key":"ijcwt.2014100105-10","doi-asserted-by":"crossref","first-page":"108","DOI":"10.1007\/978-3-642-03356-8_7","article-title":"Randomizable Proofs and Delegatable Anonymous Credentials","volume":"Vol. 5677","author":"M.Belenkiy","year":"2009","journal-title":"Advances in Cryptology - CRYPTO 2009, ser"},{"key":"ijcwt.2014100105-11","doi-asserted-by":"publisher","DOI":"10.1007\/s11280-005-3045-4"},{"issue":"12","key":"ijcwt.2014100105-12","article-title":"Secure sessions for web services.","volume":"10","author":"K.Bhargavan","year":"2007","journal-title":"ACM Transactions on Information and System Security"},{"key":"ijcwt.2014100105-13","unstructured":"Bhatti, R., Joshi, J. B. D., Bertino, E., & Ghafoor, A. (2003). Access Control in Dynamic XML-based Web-Services with XRBAC. In Proc. of the 1st Int. Conference on Web Services, Las Vegas."},{"key":"ijcwt.2014100105-14","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48749-2_8"},{"key":"ijcwt.2014100105-15","doi-asserted-by":"publisher","DOI":"10.1145\/1030083.1030104"},{"key":"ijcwt.2014100105-16","doi-asserted-by":"crossref","DOI":"10.7551\/mitpress\/5931.001.0001","author":"S. A.Brands","year":"2000","journal-title":"Rethinking Public Key Infrastructures and Digital Certificates: Building in Privacy"},{"key":"ijcwt.2014100105-17","unstructured":"Bright, P. (2013). DRM in HTML5 is a victory for the open Web, not a defeat. Ars Technica, 2013-05-10. Retrieved 2013-08-05 from http:\/\/arstechnica.com\/business\/2013\/05\/drm-in-html5-is-a-victory-for-the-open-web-not-a-defeat\/"},{"key":"ijcwt.2014100105-18","doi-asserted-by":"publisher","DOI":"10.1007\/s12394-009-0031-5"},{"key":"ijcwt.2014100105-19","doi-asserted-by":"crossref","unstructured":"Cantor, S. (2005). Shibboleth Architecture. Protocols and Profiles. Retrieved 2013-08-05 from http:\/\/shibboleth.internet2.edu\/shibboleth-documents.html","DOI":"10.26869\/TI.66.1"},{"key":"ijcwt.2014100105-20","first-page":"21","article-title":"SOPA, PIPA, ACTA, TPP: An Alphabet Soup of Innovation-Stifling Copyright Legislation and Agreements.","volume":"11","author":"M. A.Carrier","year":"2013","journal-title":"Nw. J. Tech. & Intell. Prop."},{"key":"ijcwt.2014100105-21","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.1313"},{"key":"ijcwt.2014100105-22","unstructured":"Chen, L., Pearson, S., Proudler, G., Chan, D., and Balacheff, B. (2000). How can you trust a computing platform?. Proceedings of Information Security Solutions Europe (ISSE 2000)."},{"key":"ijcwt.2014100105-23","doi-asserted-by":"publisher","DOI":"10.1145\/188280.188371"},{"key":"ijcwt.2014100105-24","doi-asserted-by":"publisher","DOI":"10.1007\/s10550-007-0042-4"},{"key":"ijcwt.2014100105-25","unstructured":"Coyle, K. (2003). The Technology of Rights: Digital Rights Management. Retrieved 2013-08-05 from http:\/\/www.kcoyle.net\/drm_basics.pdf"},{"key":"ijcwt.2014100105-26","doi-asserted-by":"crossref","unstructured":"Dimmock, N., Bacon, J., Ingram, D., & Moody, K. (2005). Risk models for trust-based access control (TBAC). In Trust Management (pp. 364-371). Springer Berlin Heidelberg.","DOI":"10.1007\/11429760_25"},{"key":"ijcwt.2014100105-27","doi-asserted-by":"crossref","unstructured":"Ellison, C., Frantz, B., Lampson, B., Rivest, R., Thomas, B., and Ylonen, T. (1999). SPKI certificate theory. IETF RFC 2693, September 1999.","DOI":"10.17487\/rfc2693"},{"key":"ijcwt.2014100105-28","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2003.1212691"},{"key":"ijcwt.2014100105-29","doi-asserted-by":"publisher","DOI":"10.1007\/978-94-017-3614-5_3"},{"key":"ijcwt.2014100105-30","doi-asserted-by":"publisher","DOI":"10.4018\/jec.2013070104"},{"key":"ijcwt.2014100105-31","doi-asserted-by":"publisher","DOI":"10.4018\/jitr.2014070104"},{"key":"ijcwt.2014100105-32","unstructured":"Franchi, E., & Tomaiuolo, M. (2012). Software Agents for Distributed Social Networking. In Proceedings of the 13th Workshop on Objects and Agents (WOA), Milan, Italy."},{"key":"ijcwt.2014100105-33","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2002.1022279"},{"key":"ijcwt.2014100105-34","unstructured":"Garfinkel, T., Rosenblum, M., & Boneh, D. (2003, May). Flexible OS Support and Applications for Trusted Computing. In HotOS (pp. 145-150)."},{"key":"ijcwt.2014100105-35","unstructured":"Greene, J. (2012). Intel Trusted Execution Technology, white paper. Retrieved 2013-08-05 from http:\/\/www.intel.com\/txt\/"},{"key":"ijcwt.2014100105-36","unstructured":"Halpin, H. (2013). DRM and HTML5: it's now or never for the Open Web. The Guardian, 2013-06-06. Retrieved 2013-08-05 from http:\/\/www.theguardian.com\/technology\/2013\/jun\/06\/html5-drm-w3c-open-web"},{"key":"ijcwt.2014100105-37","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-47719-5_12"},{"key":"ijcwt.2014100105-38","unstructured":"J\u00f8sang, A. (2014, March). Potential Cyber Warfare Capabilities of Major Technology Vendors. In Proceedings of the 13th European Conference on Cyber warefare and Security: ECCWS 2014 (p. 110). Academic Conferences Limited."},{"key":"ijcwt.2014100105-39","doi-asserted-by":"publisher","DOI":"10.1007\/11429760_7"},{"key":"ijcwt.2014100105-40","doi-asserted-by":"publisher","DOI":"10.4018\/978-1-4666-5202-6.ch082"},{"key":"ijcwt.2014100105-41","unstructured":"Kuhlmann, D., Landfermann, R., Ramasamy, H., Schunter, M., Ramunno, G., & Vernizzi, D. (2006). An open trusted computing architecture\u2014secure virtual machines enabling user-defined policy enforcement. Retrieved 2013-08-05 from http:\/\/www.opentc.net\/"},{"key":"ijcwt.2014100105-42","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-09428-1_20"},{"key":"ijcwt.2014100105-43","doi-asserted-by":"crossref","unstructured":"Li, J., & Li, N. (2005). OACerts: Oblivious attribute certificates. In Proceedings of the 3rd Conference on Applied Cryptography and Network Security (ACNS), ser. Lecture Notes in Computer Science vol. 353, pp. 301-3017. Springer.","DOI":"10.1007\/11496137_21"},{"key":"ijcwt.2014100105-44","doi-asserted-by":"publisher","DOI":"10.1109\/CSFW.2000.856921"},{"key":"ijcwt.2014100105-45","doi-asserted-by":"publisher","DOI":"10.1007\/s00446-004-0116-1"},{"key":"ijcwt.2014100105-46","doi-asserted-by":"publisher","DOI":"10.1145\/605434.605438"},{"key":"ijcwt.2014100105-47","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-77990-2_12"},{"key":"ijcwt.2014100105-48","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.982"},{"key":"ijcwt.2014100105-49","doi-asserted-by":"publisher","DOI":"10.1145\/1160633.1160795"},{"key":"ijcwt.2014100105-50","unstructured":"O\u2019Riordan, C. (2006). Transcript of Opening session of first international GPLv3 conference. January 2006. Retrieved 2013-08-05 from http:\/\/www.ifso.ie\/documents\/gplv3-launch-2006-01-16.html"},{"journal-title":"Trusted computing platforms, the next security solution","year":"2002","author":"S.Pearson","key":"ijcwt.2014100105-51"},{"journal-title":"Trusted computing platforms: TCPA technology in context","year":"2003","author":"S.Pearson","key":"ijcwt.2014100105-52"},{"key":"ijcwt.2014100105-53","doi-asserted-by":"crossref","unstructured":"Pedersen, T. (1991). Non-Interactive and Information-Theoretic Secure Verifiable Secret Sharing. In Advances in Cryptology \u2014 CRYPTO \u201991, ser. Lecture Notes in Computer Science vol. 576, Springer Berlin \/ Heidelberg, pp. 129-140.","DOI":"10.1007\/3-540-46766-1_9"},{"key":"ijcwt.2014100105-54","first-page":"1","author":"B.Pfitzmann","year":"2001","journal-title":"The PERSEUS system architecture"},{"key":"ijcwt.2014100105-55","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-16089-9_6"},{"key":"ijcwt.2014100105-56","doi-asserted-by":"publisher","DOI":"10.1109\/ENABL.2004.30"},{"key":"ijcwt.2014100105-57","unstructured":"Poggi, A., Tomaiuolo, M., & Turci, P. (2007). An Agent-Based Service Oriented Architecture, in Proceedings of the 8th Workshop on Objects and Agents (WOA), 157-165."},{"key":"ijcwt.2014100105-58","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-39962-9_95"},{"key":"ijcwt.2014100105-59","doi-asserted-by":"publisher","DOI":"10.1007\/11532095_10"},{"key":"ijcwt.2014100105-60","doi-asserted-by":"publisher","DOI":"10.1109\/DEXA.2003.1232052"},{"key":"ijcwt.2014100105-61","unstructured":"Rivest, R. L., & Lampson, B. (1996). SDSI - A Simple Distributed Security Infrastructure. September 15, 1996. http:\/\/people.csail.mit.edu\/rivest\/sdsi11.html (Accessed 20 August 2012)."},{"key":"ijcwt.2014100105-62","doi-asserted-by":"crossref","unstructured":"Sadeghi, A. R., & St\u00fcble, C. (2004). Taming \u201ctrusted platforms\u201d by operating system design. In Information Security Applications (pp. 286-302). Springer Berlin Heidelberg.","DOI":"10.1007\/978-3-540-24591-9_22"},{"key":"ijcwt.2014100105-63","unstructured":"Sadeghi, A. R., St\u00fcble, C., & Pohlmann, N. (2004). European multilateral secure computing base. Datenschutz und Datensicherheit, 548-554."},{"key":"ijcwt.2014100105-64","unstructured":"Schneier, B. (2002). Crypto-Gram Newsletter August 15, 2002. Retrieved 2013-08-05 from http:\/\/www.schneier.com\/crypto-gram-0208.html"},{"key":"ijcwt.2014100105-65","unstructured":"Schoen, S. D. (2003). EOF - Give TCPA an Owner Override. Linux Journal 116, December 2003. Retrieved 2013-08-05 from http:\/\/www.linuxjournal.com\/article\/7055"},{"key":"ijcwt.2014100105-66","unstructured":"Seamons, K. E., Winslett, M., & Yu, T. (2001). Limiting the disclosure of access control policies during automated trust negotiation. In Proc. of the Network and Distributed Systems Symposium."},{"key":"ijcwt.2014100105-67","doi-asserted-by":"publisher","DOI":"10.1109\/HASE.2007.76"},{"key":"ijcwt.2014100105-68","doi-asserted-by":"publisher","DOI":"10.1007\/s11432-010-0069-x"},{"key":"ijcwt.2014100105-69","doi-asserted-by":"publisher","DOI":"10.1145\/253671.253726"},{"key":"ijcwt.2014100105-70","unstructured":"Stallman, R. (2002). Can you trust your computer?. Free Software, Free Society: Selected Essays of Richard M. Stallman, 115-118."},{"issue":"3","key":"ijcwt.2014100105-71","first-page":"102","article-title":"Digital Rights Management: The Technology Behind The Hype.","volume":"4","author":"M.Stamp","year":"2003","journal-title":"Journal of Electronic Commerce Research"},{"key":"ijcwt.2014100105-72","doi-asserted-by":"publisher","DOI":"10.4018\/jisp.2013070104"},{"key":"ijcwt.2014100105-73","unstructured":"Tomaiuolo, M., & Agazzi, F. (2013). Trust Negotiation for Automated Service Integration. In Proceedings of the 14th Workshop on Objects and Agents. Turin, Italy, December 02-03, 2013. Security (IFIPTM 2008)."},{"key":"ijcwt.2014100105-74","unstructured":"Tygar, J., & Yee, B. (1991). Dyad: A system for using physically secure coprocessors. Technical Report CMU-CS-91-140R, Carnigie Mellon University, Pittsburgh, Pennsylvania, USA, May 1991."},{"key":"ijcwt.2014100105-75","doi-asserted-by":"crossref","unstructured":"Walker, J. (2003). The Digital imprimatur: How big brother and big media can put the Internet genie back in the bottle. Retrieved 2013-08-05 from http:\/\/www.fourmilab.ch\/documents\/digital-imprimatur\/","DOI":"10.1007\/s12130-003-1032-6"},{"key":"ijcwt.2014100105-76","unstructured":"Welch, V., Foster, I., Kesselman, C., Mulmo, O., Pearlman, L., Tuecke, S., . . . Siebenlist, F. (2004). X.509 Proxy Certificates for Dynamic Delegation. In Proceedings of the 3rd Annual PKI R&D Workshop, Gaithersburg MD, USA, NIST Technical Publications."},{"key":"ijcwt.2014100105-77","doi-asserted-by":"publisher","DOI":"10.1109\/HPDC.2003.1210015"},{"key":"ijcwt.2014100105-78","first-page":"88","article-title":"Automated trust negotiation","volume":"Vol. I","author":"W. H.Winsborough","year":"2000","journal-title":"DARPA Information Survivability Conference and Exposition"},{"key":"ijcwt.2014100105-79","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2002.1067734"},{"key":"ijcwt.2014100105-80","unstructured":"XrML. (2002). XrML 2.0 Technical Overview Version 1.0. March 8, 2002. Retrieved 2013-08-05 from http:\/\/www.xrml.org\/Reference\/XrMLTechnicalOverviewV1.pdf"},{"key":"ijcwt.2014100105-81","doi-asserted-by":"publisher","DOI":"10.1145\/605434.605435"}],"container-title":["International Journal of Cyber Warfare and Terrorism"],"original-title":[],"language":"ng","link":[{"URL":"https:\/\/www.igi-global.com\/viewtitle.aspx?TitleId=127387","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,27]],"date-time":"2025-05-27T17:33:20Z","timestamp":1748367200000},"score":1,"resource":{"primary":{"URL":"https:\/\/services.igi-global.com\/resolvedoi\/resolve.aspx?doi=10.4018\/ijcwt.2014100105"}},"subtitle":[""],"short-title":[],"issued":{"date-parts":[[2014,10,1]]},"references-count":82,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2014,10]]}},"URL":"https:\/\/doi.org\/10.4018\/ijcwt.2014100105","relation":{},"ISSN":["1947-3435","1947-3443"],"issn-type":[{"type":"print","value":"1947-3435"},{"type":"electronic","value":"1947-3443"}],"subject":[],"published":{"date-parts":[[2014,10,1]]}}}