Talk:Chain of trust

From Wikipedia, the free encyclopedia
Jump to navigation Jump to search
WikiProject Computing (Rated Start-class)
WikiProject iconThis article is within the scope of WikiProject Computing, a collaborative effort to improve the coverage of computers, computing, and information technology on Wikipedia. If you would like to participate, please visit the project page, where you can join the discussion and see a list of open tasks.
Start-Class article Start  This article has been rated as Start-Class on the project's quality scale.
 ???  This article has not yet received a rating on the project's importance scale.
 
WikiProject Computer Security / Computing  (Rated Start-class, Mid-importance)
WikiProject iconThis article is within the scope of WikiProject Computer Security, a collaborative effort to improve the coverage of computer security on Wikipedia. If you would like to participate, please visit the project page, where you can join the discussion and see a list of open tasks.
Start-Class article Start  This article has been rated as Start-Class on the project's quality scale.
 Mid  This article has been rated as Mid-importance on the project's importance scale.
Taskforce icon
This article is supported by WikiProject Computing.
 

I rewrote this article to make it sound more like an encyclopedia article than a college lecture, but I left the stub tag on it since it still needs some attention from somebody who is more knowelegable about trusted computing than I am. --Transfinite 05:00, 10 June 2006 (UTC)

As it applies to DNSSEC[edit]

DNSSEC also uses a chain of trust, but I don't believe it has anything to do with trusted computing or hardware. Perhaps this article should be re-written to reflect the more general concept of a chain of trust.--74.100.232.184 (talk) 13:37, 4 November 2010 (UTC)