Skip to Content
A Practical Guide to Trusted Computing
book

A Practical Guide to Trusted Computing

by David Challener, Kent Yoder, Ryan Catherman, David Safford, Leendert Van Doorn
December 2007
Intermediate to advanced content levelIntermediate to advanced
384 pages
9h 30m
English
IBM Press
Content preview from A Practical Guide to Trusted Computing

Appendix C

Function Library

In reviewing the various software programs that are listed in this document, it became clear that a few subroutines that make use of the base functions of the TCG TPM would be useful. These functions would either separate out functionality from TPM functions that are so overloaded with function as to make them hard to use, or they would provide function that is an aggregate of functions defined in the TPM. This appendix is a list of those functions (which are not in the standard itself) and a description of their functionality.

image

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Trusted Computing

Trusted Computing

Dengguo Feng, Tsinghua University Tsinghua University Press
Security and Privacy in Cyber-Physical Systems

Security and Privacy in Cyber-Physical Systems

Houbing Song, Glenn A. Fink, Sabina Jeschke
Trusted Computing Platforms: TCPA Technology in Context

Trusted Computing Platforms: TCPA Technology in Context

Siani Pearson, Boris Balacheff, Liqun Chen, David Plaquin, Graeme Proudler

Publisher Resources

ISBN: 9780132398428Purchase book