Index

A

abstraction, 144. See also TCS

access

data to specific PCs, locking, 198-199

DMA, 246

FAT, 185

group hard disks, 194-196

localities, 75

administration

devices, 231-240

DRM, 200

functions, 279-288

PKCS#11, 161

TCS, 146-152

TSS, 94

VPN endpoints, 208-210

administrators, TPM commands, 293

adware, 7

AES (Advanced Encryption Standard), 19, 182

algorithms

hash, 88-89

SHA-1, 15

SHA1, 97-99

symmetric, 181-193

AMD Secure Virtual Machine, 72-74

analysis, security, 26-28

APIs (application programming interfaces), 3

PKCS#11, 157-163

TSS functionality, 77

applications

clients, 9

encryption, 182

helper programs, 193

migration, 169-178

PKCS#11, 157-169

TCS, 144-145

TSS, 77

utility functions, 104, 107

validation data structure, 101-102

architecture ...

Get A Practical Guide to Trusted Computing now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.