This book has focused on trustworthy computing platforms. What does it mean for stakeholders to be able to trust a computing device to carry out its correct computation, despite direct adversarial attack? How can we go about building such a device? If we had one, what could we do with it?
KeywordsTrusted Platform Module Trust Computing Group Platform Configuration Identity Credential Trust Computing Platform
Unable to display preview. Download preview PDF.
- [Fe103]E. Felten. Understanding Trusted Computing. IEEE Security and Privacy, pages 60–62, May/June 2003.[Sch02]Google Scholar
- [Pea03]S. Pearson, editor. Trusted Computing Platforms: TCPA Technology in Context. Prentice Hall, 2003.Google Scholar
- [Tru04]Trusted Computing Group. TCG Specification Architecture Overview. http://www.trustedcomputinggroup.org April 2004. Specification Revision 1. 2.
- [MSWM03]J. Marchesini, S.W. Smith, O. Wild, and R. Macdonald. Experimenting with TCPA/TCG Hardware, Or: How I Learned to Stop Worrying and Love The Bear. Technical Report TR2003–476, Dartmouth College Department of Computer Science, December 2003.Google Scholar