Trusted Computing Platforms
In this book the authors first describe the background of trusted platforms and trusted computing and speculate about the future. They then describe the technical features and architectures of trusted platforms from several different perspectives, finally explaining second-generation TPMs, including a technical description intended to supplement the Trusted Computing Group's TPM2 specifications. The intended audience is IT managers and engineers and graduate students in information security.
Valuable reference for industrial researchers and practitioners, IT managers and graduate students in information securityAuthors among leading industrial researchers and members of related specification and standardisation committees Provides a record of origins and justifications for trusted platforms and trusted computing