O'Reilly logo

A Practical Guide to Trusted Computing by Leendert Van Doorn, David Safford, Ryan Catherman, Kent Yoder, David Challener

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Index

A

abstraction, 144. See also TCS

access

data to specific PCs, locking, 198-199

DMA, 246

FAT, 185

group hard disks, 194-196

localities, 75

administration

devices, 231-240

DRM, 200

functions, 279-288

PKCS#11, 161

TCS, 146-152

TSS, 94

VPN endpoints, 208-210

administrators, TPM commands, 293

adware, 7

AES (Advanced Encryption Standard), 19, 182

algorithms

hash, 88-89

SHA-1, 15

SHA1, 97-99

symmetric, 181-193

AMD Secure Virtual Machine, 72-74

analysis, security, 26-28

APIs (application programming interfaces), 3

PKCS#11, 157-163

TSS functionality, 77

applications

clients, 9

encryption, 182

helper programs, 193

migration, 169-178

PKCS#11, 157-169

TCS, 144-145

TSS, 77

utility functions, 104, 107

validation data structure, 101-102

architecture ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required