Chapter 2. Usage Scenarios
In this chapter, we bring together a variety of applications of Trusted Platforms (TPs). We start with using TPs for conventional security applications, and then describe adaptations that use special TP properties. We also give a flavor of more forward-looking applications, such as those considered further in Part 4.
First, however, it must be acknowledged that today's typical platform makes little use of security (other than for Internet communications). The features that sell platforms are the applications that provide tangible benefits to customers. Security features, when provided, are often considered obstacles to convenience and are disabled or circumvented. So why would anyone want a TP?
People agree that applications ...
Get Trusted Computing Platforms: TCPA Technology in Context now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.