Your browser does not support JavaScript!
http://iet.metastore.ingenta.com
1887

Introduction

Introduction

For access to this article, please select a purchase option:

Buy chapter PDF
£10.00
(plus tax if applicable)
Buy Knowledge Pack
10 chapters for £75.00
(plus taxes if applicable)

IET members benefit from discounts to all IET publications and free access to E&T Magazine. If you are an IET member, log in to your account and the discounts will automatically be applied.

Learn more about IET membership 

Recommend Title Publication to library

You must fill out fields marked with: *

Librarian details
Name:*
Email:*
Your details
Name:*
Email:*
Department:*
Why are you recommending this title?
Select reason:
 
 
 
 
 
Trusted Platform Modules: Why, when and how to use them — Recommend this title to your library

Thank you

Your recommendation has been sent to your librarian.

One of the major problems with trusted computing adoption has been a lack of good introductory information. People wondering what this technology is, why they should care about it, or how they should get started using it have generally not had very many resources to turn to. In this book, I will begin with the most basic questions of what the technology is; talk about when this technology is most useful (and, equally important, when it's not); and then start introducing the technical details of why and how to use the technology. If you're still at the stage of wondering if this technology is relevant to you, start with the first couple of chapters; there's enough complexity here that a classic engineer's `jump in feet first' approach is inefficient. If you're familiar with the basics of trusted computing technology already, Chapters 4 and up will provide you with useful reference material, but you may also find new ideas for how trusted computing can be applied in your environment in Chapter 2. This book is intended for a technical audience, but not one with any particular familiarity with trusted computing, hardware, or security concepts.

Chapter Contents:

  • 1.1 About this book
  • 1.1.1 The enterprise approach
  • 1.1.2 User stories
  • 1.2 What is trusted computing?
  • 1.2.1 What do we mean by 'trusted'?
  • 1.2.2 A brief history of trusted computing
  • 1.2.3 The Trusted Computing Group
  • 1.3 TPMs at a high level
  • 1.3.1 Roots of Trust
  • 1.3.2 Chains of trust
  • 1.3.3 The TPM threat model
  • 1.3.4 What TPMs are good for
  • 1.3.5 What TPMs aren't good for
  • 1.3.6 TPM versions
  • 1.3.7 Common TPM myths
  • 1.3.7.1 Myth: the TPM makes everything more secure
  • 1.3.7.2 Myth: the TPM controls system boot
  • 1.3.7.3 Myth: the TPM is tamper-proof
  • 1.3.7.4 Myth: the TPM works for [ insert corporation here]
  • 1.4 Where to find TPMs
  • 1.5 TPM software options

Inspec keywords: trusted computing; security of data

Other keywords: trusted computing; security concepts; technical details; trusted platform modules

Subjects: Data security

Preview this chapter:
Zoom in
Zoomout

Introduction, Page 1 of 2

| /docserver/preview/fulltext/books/pc/pbpc013e/PBPC013E_ch1-1.gif /docserver/preview/fulltext/books/pc/pbpc013e/PBPC013E_ch1-2.gif

Related content

content/books/10.1049/pbpc013e_ch1
pub_keyword,iet_inspecKeyword,pub_concept
6
6
Loading
This is a required field
Please enter a valid email address