Abstract
This paper, focusing on the trusted computing group's standards, explained the key concept of trusted computing and provided the architecture of trusted PC. It built trust bottom-up by starting with trusted hardware and adding layers of trusted software. It is a system-level solution available to all applications running on the member platforms. This solution reduces the security burden on applications and thus simplifies application programming.
Similar content being viewed by others
References
Lange K. Security What Does “Trust” Have to Do With It? [EB/OL]. [2006-03-27].http://www.sans.org/reading_room/whitepapers/windows/939.php.
Anderson R. The Economics of Trusted Computing [EB/OL]. [2002-11-07].http://www.netproject.co.uk/presentations/TCPA/ross_anderson.pdf.
Hageman C. The Trusted PC: Current Status of Trusted Computing [EB/OL]. [2006-03-27].http://www.sans.org/reading_room/whitepapers/standards/1146.php.
TCG. TCG Specification Architecture Overview [EB/OL]. [2004-04-28].https://www.trustedcomputinggroup.org/groups/TCG_1_0_Architecture_Overview.pdf.
TCG, TCG Main Specification[EB/OL]. [2006-03-27].http://www.trustedcomputinggroup.org/downloads/tcg_spec_1_1b.zip.
TCG. TPM Main Part 1 Design Principles[EB/OL]. [2006-03-29].https://www.trustedcomputinggroup.org/specs/TPM/Main_Part3_Rev94.zip.
TCG. TPM Main Part 3 Commands[EB/OL]. [2006-03-29].https://www.trustedcomputinggroup.org/specs/TPM/Main_Part3_Rev94.zip.
Huang A. The Trusted PC: Skin-Deep Security[J].IEEE Computer 2002,10(10): 103–105.
TCG. TCG PC Specific Implementation Specification [EB/OL]. [2006-03-27].https://www.trustedcomputinggroup.org/groups/pc_client/TCG_PCSpecificSpecification_vl_1.pdf.
TCG. TCG Software Stack (TSS) Specification [EB/OL]. [2006-03-29].https://www.trustedcomputinggroup.org/groups/software/TSS_Version_1.1.pdf.
Author information
Authors and Affiliations
Corresponding author
Additional information
Foundation item: Supported by the National Natural Science Foundation of China (60473021)
Biography: WU Shuhua (1978-), male, Ph. D. candidate, research direction: cryptography and information security.
Rights and permissions
About this article
Cite this article
Shuhua, W., Yuefei, Z. Architecture of trusted PC. Wuhan Univ. J. Nat. Sci. 11, 1433–1436 (2006). https://doi.org/10.1007/BF02831791
Received:
Issue Date:
DOI: https://doi.org/10.1007/BF02831791