Your browser does not support JavaScript!
http://iet.metastore.ingenta.com
1887

Data protection

Data protection

For access to this article, please select a purchase option:

Buy chapter PDF
£10.00
(plus tax if applicable)
Buy Knowledge Pack
10 chapters for £75.00
(plus taxes if applicable)

IET members benefit from discounts to all IET publications and free access to E&T Magazine. If you are an IET member, log in to your account and the discounts will automatically be applied.

Learn more about IET membership 

Recommend Title Publication to library

You must fill out fields marked with: *

Librarian details
Name:*
Email:*
Your details
Name:*
Email:*
Department:*
Why are you recommending this title?
Select reason:
 
 
 
 
 
Trusted Platform Modules: Why, when and how to use them — Recommend this title to your library

Thank you

Your recommendation has been sent to your librarian.

The book reviews developments in the following fields: data storage; trusted platform module; TPM encryption features; disk encryption; bulk data protection; secure data transmission; TPM internal storage; and conditional data access.

Chapter Contents:

  • 8.1 The pros and cons of TPMs for data storage
  • 8.2 Basic TPM encryption features
  • 8.2.1 Storage hierarchies and data protection
  • 8.3 Disk encryption, bulk data protection, and secure backups
  • 8.4 Small-scale data protection
  • 8.4.1 Small-scale local encryption
  • 8.5 Secure data transmission
  • 8.5.1 Binding, legacy keys, and backwards compatibility
  • 8.6 Alternate backup techniques
  • 8.7 The TPM's internal storage (NVRAM)
  • 8.7.1 Using NVRAM in 1.2
  • 8.7.2 Using NVRAM in 2.0
  • 8.8 Conditional data access
  • 8.9 Data protection user stories
  • 8.10 TSS 1.2 data protection code examples
  • 8.10.1 Binding and unbinding
  • 8.10.2 Sealing and unsealing
  • 8.10.3 Using NVRAM
  • 8.11 TSS 2.0 data protection code examples
  • 8.11.1 Creating a sealed blob
  • 8.11.2 Decrypting a sealed blob
  • 8.11.3 Using NV storage
  • 8.11.4 Reading NV contents and manufacturer certificates

Inspec keywords: data protection; storage management; trusted computing; cryptography

Other keywords: data storage; secure data transmission; conditional data access; disk encryption; TPM internal storage; trusted platform module; TPM encryption features; bulk data protection

Subjects: General and management topics; File organisation; Cryptography; General electrical engineering topics; Data security

Preview this chapter:
Zoom in
Zoomout

Data protection, Page 1 of 2

| /docserver/preview/fulltext/books/pc/pbpc013e/PBPC013E_ch8-1.gif /docserver/preview/fulltext/books/pc/pbpc013e/PBPC013E_ch8-2.gif

Related content

content/books/10.1049/pbpc013e_ch8
pub_keyword,iet_inspecKeyword,pub_concept
6
6
Loading
This is a required field
Please enter a valid email address