Index
A
abstraction, 144. See also TCS
access
data to specific PCs, locking, 198-199
DMA, 246
FAT, 185
group hard disks, 194-196
localities, 75
administration
devices, 231-240
DRM, 200
functions, 279-288
PKCS#11, 161
TCS, 146-152
TSS, 94
VPN endpoints, 208-210
administrators, TPM commands, 293
adware, 7
AES (Advanced Encryption Standard), 19, 182
algorithms
hash, 88-89
SHA-1, 15
SHA1, 97-99
symmetric, 181-193
AMD Secure Virtual Machine, 72-74
analysis, security, 26-28
APIs (application programming interfaces), 3
PKCS#11, 157-163
TSS functionality, 77
applications
clients, 9
encryption, 182
helper programs, 193
migration, 169-178
PKCS#11, 157-169
TCS, 144-145
TSS, 77
validation data structure, 101-102
architecture ...
Get A Practical Guide to Trusted Computing now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.