This article is within the scope of WikiProject Computing, a collaborative effort to improve the coverage of computers, computing, and information technology on Wikipedia. If you would like to participate, please visit the project page, where you can join the discussion and see a list of open tasks.ComputingWikipedia:WikiProject ComputingTemplate:WikiProject ComputingComputing
This article is within the scope of WikiProject Computer security, a collaborative effort to improve the coverage of computer security on Wikipedia. If you would like to participate, please visit the project page, where you can join the discussion and see a list of open tasks.Computer securityWikipedia:WikiProject Computer securityTemplate:WikiProject Computer securityComputer security
Create the Project Navigation Box including lists of adopted articles, requested articles, reviewed articles, etc.
Find editors who have shown interest in this subject and ask them to take a look here.
I rewrote this article to make it sound more like an encyclopedia article than a college lecture, but I left the stub tag on it since it still needs some attention from somebody who is more knowelegable about trusted computing than I am. --Transfinite05:00, 10 June 2006 (UTC)[reply]
DNSSEC also uses a chain of trust, but I don't believe it has anything to do with trusted computing or hardware. Perhaps this article should be re-written to reflect the more general concept of a chain of trust.--74.100.232.184 (talk) 13:37, 4 November 2010 (UTC)[reply]