Book description
TCPA: Building computing platforms upon a solid foundation of trust.
As businesses stake their very existence on the Internet, PCs, PDAs, and other key computing platforms, the trustworthiness of these platforms has become a vital concern. In response, the Trusted Computing Platform Alliance (TCPA) has delivered a complete specification for building trusted computing platforms atop trusted hardware. In Trusted Computing Platforms, leaders of the initiative illuminate TCPA for every systems developer and decision-maker. They place TCPA in context, outlining its goals, techniques, and powerful implications for the future.
What trusted computing platforms are, how they work, and what problems they will solve
Transforming standard platforms into trusted platforms cost-effectively
Scenarios for managers: TCPA applications in the security-focused business
Protected storage: how TCPA can ensure the confidentiality of stored data
Software integrity: ensuring that a system's software environment hasn't been tampered with
Trust mechanisms in a trusted platform: functional descriptions, advantages, and overhead
Trusted platforms in practice: TCPA for developers and technical professionals
How trusted platforms can be used to protect user privacy
The TCPA initiative: its history, status, and next steps forward
Backed by an extraordinary range of industry leaders, TCPA offers the first complete, cost-effective, and globally applicable solution for trusted computing. Whether you develop new systems or apply them in business or government, you need to understand this technology—and with this book, you will.
Table of contents
- Copyright
- Hewlett-Packard® Professional Books
- Foreword
- Preface
- About the Authors
- Introducing Trusted Platform Technology
- Trust Mechanisms in a Trusted Platform
- Trusted Platforms In Practice
- Trusted Platforms for Organizations and Individuals
- Index
Product information
- Title: Trusted Computing Platforms: TCPA Technology in Context
- Author(s):
- Release date: July 2002
- Publisher(s): Pearson
- ISBN: 0130092207
You might also like
book
Crypto Dictionary
Expand your mind and your crypto knowledge with the ultimate desktop dictionary for all things cryptography. …
article
Reinventing the Organization for GenAI and LLMs
Previous technology breakthroughs did not upend organizational structure, but generative AI and LLMs will. We now …
book
Managing Trust in Cyberspace
Bringing together cross-disciplinary expertise, this illustrated, tutorial-style text addresses fundamentals underpinning computational trust models and covers …
book
Platform Embedded Security Technology Revealed : Safeguarding the Future of Computing with Intel Embedded Security and Management Engine
is an in-depth introduction to Intel's platform embedded solution: the security and management engine. The engine …