Book 2015
Open Access This content is freely available online to anyone, anywhere at any time.

A Practical Guide to TPM 2.0

Using the New Trusted Platform Module in the New Age of Security

Authors:

ISBN: 978-1-4302-6583-2 (Print) 978-1-4302-6584-9 (Online)

Table of contents (22 chapters)

previous Page of 2
  1. Front Matter

    Pages i-xxxi

  2. Chapter

    Pages 1-5

    History of the TPM

  3. Chapter

    Pages 7-22

    Basic Security Concepts

  4. Chapter

    Pages 23-37

    Quick Tutorial on TPM 2.0

  5. Chapter

    Pages 39-50

    Existing Applications That Use TPMs

  6. Chapter

    Pages 51-69

    Navigating the Specification

  7. Chapter

    Pages 71-76

    Execution Environment

  8. Chapter

    Pages 77-96

    TPM Software Stack

  9. Chapter

    Pages 97-104

    TPM Entities

  10. Chapter

    Pages 105-118

    Hierarchies

  11. Chapter

    Pages 119-135

    Keys

  12. Chapter

    Pages 137-150

    NV Indexes

  13. Chapter

    Pages 151-161

    Platform Configuration Registers

  14. Chapter

    Pages 163-216

    Authorizations and Sessions

  15. Chapter

    Pages 217-248

    Extended Authorization (EA) Policies

  16. Chapter

    Pages 249-261

    Key Management

  17. Chapter

    Pages 263-269

    Auditing TPM Commands

  18. Chapter

    Pages 271-287

    Decrypt/Encrypt Sessions

  19. Chapter

    Pages 289-299

    Context Management

  20. Chapter

    Pages 301-309

    Startup, Shutdown, and Provisioning

  21. Chapter

    Pages 311-321

    Debugging

previous Page of 2