Part 2: Trust Mechanisms in a Trusted Platform

In this part, we document the set of mechanisms identified by the TCPA specification to turn an ordinary platform into a TP. We hope to provide a companion to the TCPA specification that will help you understand the specification's design. This part can be read independently from the rest of the book. To accomplish this goal, we must explain how the TCPA specification Trusted Platform Module (TPM) and Trusted platform Support Services (TSS) commands are used together to provide individual trust mechanisms. Each chapter in this part covers a category of TCPA mechanisms:

  • Chapter 4 discusses access control—ownership, enabling, and authorization

  • Chapter 5 deals with platform identification and certification ...

Get Trusted Computing Platforms: TCPA Technology in Context now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.