CHAPTER 24

Trusted Computing Technology

Felipe E. Medina

Trapezoid, Inc.

Miami, Florida

Contents

24.1 Introduction

24.2 Trusted Computing Group

24.2.1 TPM Security Functions Overview

24.3 Intel Trusted Execution Technology

24.3.1 Static Chain of Trust

24.3.2 Dynamic Chain of Trust

24.3.3 Platform Configuration Registers

24.3.4 Static PCR Measurements

24.3.5 Dynamic PCR Measurements

24.4 Trusted Computing Use Case

24.5 Trapezoid Trust Visibility Engine

24.6 Summary

References

24.1 Introduction

This chapter aims to better define a specific area that encompasses hardware roots of trust and the technologies now available server side. We will address a core area of concern of information security in the cloud, ensuring that low-level compromises ...

Get Cloud Computing Security, 2nd Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.