Your browser does not support JavaScript!
http://iet.metastore.ingenta.com
1887

Software, specifications, and more: Where to find other TPM resource

Software, specifications, and more: Where to find other TPM resource

For access to this article, please select a purchase option:

Buy chapter PDF
£10.00
(plus tax if applicable)
Buy Knowledge Pack
10 chapters for £75.00
(plus taxes if applicable)

IET members benefit from discounts to all IET publications and free access to E&T Magazine. If you are an IET member, log in to your account and the discounts will automatically be applied.

Learn more about IET membership 

Recommend Title Publication to library

You must fill out fields marked with: *

Librarian details
Name:*
Email:*
Your details
Name:*
Email:*
Department:*
Why are you recommending this title?
Select reason:
 
 
 
 
 
Trusted Platform Modules: Why, when and how to use them — Recommend this title to your library

Thank you

Your recommendation has been sent to your librarian.

This book is designed as an introductory text to the world of TPMs and trusted computing, but it's far from the whole story. In this chapter, we'll discuss where to find additional resources of many kinds. These resources include software libraries to support use of the TPM, which are useful for implementing simple applications and generally giving TPM use a try; books and other materials that will help you learn more about related topics; and, for those who need to delve deeper, the specifications themselves, with an account of how to get the most out of them. Because so many of the resources referred to here are online, there is a high probability that some of the links will become obsolete at some point during the lifetime of this book. Updated links, along with other errata and additional content, will be available at http://digital-library.theiet.org/content/books/pc/ pbpc013e.

Chapter Contents:

  • 11.1 1.2 Programming tools
  • 11.1.1 1.2 Trusted/ TCG software stacks (TSS)
  • 11.1.2 Microsoft's TBS
  • 11.2 2.0 Programming tools
  • 11.2.1 IBM TSS 2.0
  • 11.2.2 2.0 TSS. Net and TSS. C++
  • 11.3 Books, courses, and other digested material
  • 11.3.1 TPM 1.2 concepts
  • 11.3.2 TPM 1.2 programming
  • 11.3.3 TPM 2.0
  • 11.3.4 Other trusted computing topics
  • 11.4 Community
  • 11.4.1 The TCG
  • 11.4.2 TrouSerS-users mailing list
  • 11.5 1.2 Specifications
  • 11.5.1 1.2 TSS specification
  • 11.5.2 1.2 TPM specification
  • 11.6 2.0 Specifications
  • 11.6.1 TCG TSS (TPM Software Stack) specifications
  • 11.6.1.1 TSS (TPM Software Stack) FAPI
  • 11.6.1.2 TSS system-level API and TPM Command Transmission Interface
  • 11.6.2 2.0 TPM specifications
  • 11.6.3 2.0 Supporting specifications
  • 11.7 Platform specifications
  • 11.7.1 1.2 Platform specifications
  • 11.7.2 2.0 Platform specification
  • 11.7.3 Specifications applying to multiple TPM versions
  • 11.8 Other useful resources
  • 11.8.1 The tpm-tools package
  • 11.8.2 TPM manufacturers
  • 11.8.3 TPM 2.0 simulators
  • 11.8.3.1 Using TPM simulators in the real world
  • 11.8.4 Example open-source applications
  • 11.8.4.1 Flicker
  • 11.8.4.2 TPM Quote Tools
  • 11.8.5 Useful trusted computing tools
  • 11.8.5.1 Integrity measurement architecture
  • 11.8.5.2 TrustedGRUB
  • 11.8.5.3 Trusted boot (tboot)
  • 11.9 Commercial software

Inspec keywords: formal specification; trusted computing

Other keywords: trusted computing; software libraries; specification; TPM resources

Subjects: Formal methods; Data security

Preview this chapter:
Zoom in
Zoomout

Software, specifications, and more: Where to find other TPM resource, Page 1 of 2

| /docserver/preview/fulltext/books/pc/pbpc013e/PBPC013E_ch11-1.gif /docserver/preview/fulltext/books/pc/pbpc013e/PBPC013E_ch11-2.gif

Related content

content/books/10.1049/pbpc013e_ch11
pub_keyword,iet_inspecKeyword,pub_concept
6
6
Loading
This is a required field
Please enter a valid email address