Research trusted computing and provide an application area that trusted computing can alleviate security issues. Your discussion should include a background section and discussion of the application area that trusted computing may be utilized.
Your related work review may address
Your report may address:
Your paper will be evaluated using criteria discussed in this paper review formDeliverable: 1500 word (at least 3 page) paper with your discussion.
What to turn in: A report should be uploaded to WebCT.