Implementing Trusted Terminals with a and SITDRM

@article{Stamm2008ImplementingTT,
  title={Implementing Trusted Terminals with a and SITDRM},
  author={Sid Stamm and Nicholas Paul Sheppard and Reihaneh Safavi-Naini},
  journal={Electr. Notes Theor. Comput. Sci.},
  year={2008},
  volume={197},
  pages={73-85}
}
The SITDRM Enterprise system [1] protects private customer data by allowing customers to provide policies in the form of a machine-readable license. When employees of an organization want to use customers’ data, they must be forced to abide by the licences provided. Some sort of hardened terminal must be used to ensure that not only the hardware and software will cooperate, but that the user of the terminal will too. We use the Trusted Computing Group’s specifications for a trusted platform… CONTINUE READING