From Wikipedia, the free encyclopedia

I rewrote this article to make it sound more like an encyclopedia article than a college lecture, but I left the stub tag on it since it still needs some attention from somebody who is more knowelegable about trusted computing than I am. -- Transfinite 05:00, 10 June 2006 (UTC) reply

As it applies to DNSSEC

DNSSEC also uses a chain of trust, but I don't believe it has anything to do with trusted computing or hardware. Perhaps this article should be re-written to reflect the more general concept of a chain of trust.-- 74.100.232.184 ( talk) 13:37, 4 November 2010 (UTC) reply

From Wikipedia, the free encyclopedia

I rewrote this article to make it sound more like an encyclopedia article than a college lecture, but I left the stub tag on it since it still needs some attention from somebody who is more knowelegable about trusted computing than I am. -- Transfinite 05:00, 10 June 2006 (UTC) reply

As it applies to DNSSEC

DNSSEC also uses a chain of trust, but I don't believe it has anything to do with trusted computing or hardware. Perhaps this article should be re-written to reflect the more general concept of a chain of trust.-- 74.100.232.184 ( talk) 13:37, 4 November 2010 (UTC) reply


Videos

Youtube | Vimeo | Bing

Websites

Google | Yahoo | Bing

Encyclopedia

Google | Yahoo | Bing

Facebook