|
|
|
|
![]() |
Trusted Platform Modules: Why, when and how to use them
The Institution of Engineering and Technology, 2017 Cloth: 978-1-84919-893-6 | eISBN: 978-1-84919-894-3 Library of Congress Classification QA76.9.A25S4535 2016 Dewey Decimal Classification 005.8
ABOUT THIS BOOK | TOC
ABOUT THIS BOOK
Trusted Platform Modules (TPMs) are small, inexpensive chips which provide a limited set of security functions. They are most commonly found as a motherboard component on laptops and desktops aimed at the corporate or government markets, but can also be found on many consumer-grade machines and servers, or purchased as independent components. Their role is to serve as a Root of Trust - a highly trusted component from which we can bootstrap trust in other parts of a system. TPMs are most useful for three kinds of tasks: remotely identifying a machine, or machine authentication; providing hardware protection of secrets, or data protection; and providing verifiable evidence about a machine's state, or attestation. See other books on: Computer networks | Programming | Security | Security measures | Why See other titles from The Institution of Engineering and Technology |
Nearby on shelf for Mathematics / Instruments and machines / Electronic computers. Computer science:
| |