A trusted computing environment 100, wherein each computing device 112 to
118 holds a policy specifying the degree to which it can trust the other
devices in the environment 100. The policies are updated by an assessor
110 which receives reports from trusted components 120 in the computing
devices 112 to 118 which identify the trustworthiness of the computing
devices 112 to 118.