Your browser does not support JavaScript!
http://iet.metastore.ingenta.com
1887

Conclusion and review

Conclusion and review

For access to this article, please select a purchase option:

Buy chapter PDF
£10.00
(plus tax if applicable)
Buy Knowledge Pack
10 chapters for £75.00
(plus taxes if applicable)

IET members benefit from discounts to all IET publications and free access to E&T Magazine. If you are an IET member, log in to your account and the discounts will automatically be applied.

Learn more about IET membership 

Recommend Title Publication to library

You must fill out fields marked with: *

Librarian details
Name:*
Email:*
Your details
Name:*
Email:*
Department:*
Why are you recommending this title?
Select reason:
 
 
 
 
 
Trusted Platform Modules: Why, when and how to use them — Recommend this title to your library

Thank you

Your recommendation has been sent to your librarian.

Over the course of this book, I've provided a basic introduction to TPMs, and how they can be used both directly and in a range of personal and enterprise contexts. I've discussed the TPM's primary functions at length: secure key storage, trusted cryptographic functionality, and reliable reporting of stored data. I've covered how TPMs need to be provisioned before use, and how establishing trust in a TPM can in some cases be a highly sensitive operation. I've discussed the different capabilities of different types of TPM keys, how to choose the correct key for an application, and how to set up appropriate access constraints. I've introduced many useful functions of the TPM, both well known and obscure, and provided guidance on how and when to use them. I've also shown how the TPM relates to the Roots of Trust for Measurement, the pros and cons of various measurement options, and how measurements can be used in the TPM.

Chapter Contents:

  • 13.1 What the TPM is good for
  • 13.2 Common TPM use cases
  • 13.3 The potential (and peril) of the future
  • 13.4 In conclusion

Inspec keywords: data handling; trusted computing; cryptography

Other keywords: roots of trust for measurement; stored data reliable reporting; TPM primary functions; trusted platform modules; TPM keys; secure key storage; TPM trust establishment; trusted cryptographic functionality; TPM provisioning

Subjects: Data security

Preview this chapter:
Zoom in
Zoomout

Conclusion and review, Page 1 of 2

| /docserver/preview/fulltext/books/pc/pbpc013e/PBPC013E_ch13-1.gif /docserver/preview/fulltext/books/pc/pbpc013e/PBPC013E_ch13-2.gif

Related content

content/books/10.1049/pbpc013e_ch13
pub_keyword,iet_inspecKeyword,pub_concept
6
6
Loading
This is a required field
Please enter a valid email address