The document discusses the concepts of trust and trusted computing. It defines trust as reliance on the integrity, strength, or ability of a person or thing, as well as a confident expectation of something. It then defines trusted computing as requiring transactions and devices to be trusted by acting in a known manner and communicating that, reliable by being available and protected against viruses, safe by stopping unwanted intervention or observation, and protected by securely sharing information.