O'Reilly logo

Cloud Computing Security by John R. Vacca

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

CHAPTER 24

Trusted Computing Technology

Felipe E. Medina

Trapezoid, Inc.

Miami, Florida

CONTENTS

24.1  Introduction

24.2  Trusted Computing Group

24.2.1  TPM Security Functions Overview

24.3  Intel Trusted Execution Technology

24.3.1  Static Chain of Trust

24.3.2  Dynamic Chain of Trust

24.3.3  Platform Configuration Registers

24.3.4  Static PCR Measurements

24.3.5  Dynamic PCR Measurements

24.4  Trusted Computing Use Case

24.5  Trapezoid Trust Visibility Engine

24.6  Summary

References

24.1  INTRODUCTION

This chapter aims to better define a specific area that encompasses hardware roots of trust and the technologies now available server side. We will address a core area of concern of information security in the cloud, ensuring that low-level ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required