It is notable for being written before the use of Digital Rights Management technology was widespread (although DVD video discs which used DRM had appeared the year before, and various proprietary software since the 1970s had made use of some form of copy protection), and for predicting later hardware-based attempts to restrict how users could use content, such as Trusted Computing.
The Microsoft products Windows Vista and Windows 7 make use of a Trusted Platform Module to facilitate BitLocker Drive Encryption.
Association for Computing Machinery | computing | Cloud computing | Parallel computing | Real-time computing | Distributed Computing Environment | cloud computing | Kernel (computing) | Georgia Institute of Technology School of Interactive Computing | Georgia Institute of Technology College of Computing | distributed computing | Computing | Server (computing) | server (computing) | Secure Computing | Centre for Education in Mathematics and Computing | Scheduling (computing) | Process (computing) | Platform (computing) | Mouse (computing) | Load balancing (computing) | Distributed computing | Computing Research Association | Bandwidth (computing) | bandwidth (computing) | Virtual Network Computing | Trusted by Millions | Skin (computing) | scheduling (computing) | Radio Computing Services |
In a classical trusted systems-theoretic sense—relying upon terminology and concepts taken from the Orange Book, the foundation of trusted computing—a system that supports MSL peers could not achieve a level of assurance beyond (B1).