A Trusted Open Platform
Click here to download now
Overview: Computers are entrusted with more personal and valuable data every day, and local and remote users need mechanisms to safeguard this data against misuse. A variety of access-control mechanisms address this problem. For example, most commercial systems require users to provide a password to log on. Users and administrators can configure the system to restrict access to resources, such as files containing sensitive data. However, such mechanisms have limited effectiveness in a mass-market setting because the kernels integrity cannot be ensured. Microsofts next-generation secure computing base aims to provide robust access control while retaining the openness of personal computers.