Trusted computing platforms: TPM2.0 in context
Gespeichert in:
Hauptverfasser: | , , |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
Cham [u.a.]
Springer
2014
|
Schlagworte: | |
Online-Zugang: | Inhaltstext Inhaltsverzeichnis |
Beschreibung: | XVIII, 382 S. Ill., graph. Darst. 235 mm x 155 mm |
ISBN: | 3319087436 9783319087436 |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV041994684 | ||
003 | DE-604 | ||
005 | 20171208 | ||
007 | t | ||
008 | 140725s2014 sz ad|| |||| 00||| eng d | ||
016 | 7 | |a 1053174071 |2 DE-101 | |
020 | |a 3319087436 |9 3-319-08743-6 | ||
020 | |a 9783319087436 |c Gb. : EUR 90.94 (DE) (freier Pr.), EUR 93.49 (AT) (freier Pr.), sfr 113.50 (freier Pr.) |9 978-3-319-08743-6 | ||
035 | |a (OCoLC)902651500 | ||
035 | |a (DE-599)DNB1053174071 | ||
040 | |a DE-604 |b ger |e rakddb | ||
041 | 0 | |a eng | |
044 | |a sz |c XA-CH | ||
049 | |a DE-739 |a DE-11 |a DE-19 | ||
084 | |a SR 860 |0 (DE-625)143367: |2 rvk | ||
084 | |a ST 277 |0 (DE-625)143643: |2 rvk | ||
084 | |a 004 |2 sdnb | ||
100 | 1 | |a Proudler, Graeme |e Verfasser |4 aut | |
245 | 1 | 0 | |a Trusted computing platforms |b TPM2.0 in context |c Graeme Proudler ; Liqun Chen ; Chris Dalton |
264 | 1 | |a Cham [u.a.] |b Springer |c 2014 | |
300 | |a XVIII, 382 S. |b Ill., graph. Darst. |c 235 mm x 155 mm | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Systemplattform |0 (DE-588)4674460-5 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Trusted Computing |0 (DE-588)7562931-8 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Trusted Computing |0 (DE-588)7562931-8 |D s |
689 | 0 | 1 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | 2 | |a Systemplattform |0 (DE-588)4674460-5 |D s |
689 | 0 | |5 DE-604 | |
700 | 1 | |a Chen, Liqun |e Verfasser |0 (DE-588)174012950 |4 aut | |
700 | 1 | |a Dalton, Chris |e Verfasser |4 aut | |
776 | 0 | 8 | |i Erscheint auch als |n Online-Ausgabe |z 978-3-319-08744-3 |
856 | 4 | 2 | |m X:MVB |q text/html |u http://deposit.dnb.de/cgi-bin/dokserv?id=4704347&prov=M&dok_var=1&dok_ext=htm |3 Inhaltstext |
856 | 4 | 2 | |m Digitalisierung UB Passau - ADAM Catalogue Enrichment |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027436850&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-027436850 |
Datensatz im Suchindex
_version_ | 1806328638624235520 |
---|---|
adam_text |
Contents
Introduction
. 1
1. [
The State of Play
. 2
1.2
Objectives
. 4
1.3
Trusted Computing Technology
. 6
1.4
Benefits of Trusted Computing
. 7
1.5
Trust, Instead of Security
. 9
1.5.1
Secure Computing
. 9
1.5.2
Trusted Computing
. 10
1.6
Limitations of Trusted Computing
. 12
1.7
Concerns About Trusted Computing
. 13
1.8
First Generation Trusted Computing
. 18
References
. 19
Futures for Trusted Computing
. 21
2.1
Trusted
Virtualisation
. 21
2.1.1
Privacy Implications of Trusted
Virtualisation
. 24
2.1.2
Virtualised Trusted Platforms
. 25
2.2
Future Trusted Services
. 26
2.2.1
Data Deletion
. 26
2.2.2
Contracts and Negotiations
. 27
2.2.3
Single Sign-On
. 28
2.2.4
Trusted Software Agents
. 28
2.2.5
What You See Is What You Sign
. 29
2.3
Infrastructure Requirements
.,.,.,.,,. 29
2.3.1
Public Key Infrastructure
. 29
2.3.2
Manufacture
. 30
2.3.3
Upgrading TPMs
. 31
2.3.4
Upgrading Integrity Metrics
.,. 31
2.3.5
Auditing Trusted Platforms
. 32
2.3.6
Discovering Trusted Services
. 33
Xlii
xiv Contents
3 Basics
of Trusted Platforms
. 37
3.1
Design Constraints, Requirements, and Motivations
. 37
3.1.1
Legacy Platforms, Software and Infrastructure
. 37
3.1.2
Out of the Box
. 38
3.1.3
Legal
. 38
3.1.4
Privacy Constraints
. 40
3.1.5
Disaster Recovery
. 41
3.2
Conventional Security in Trusted Platforms
. 43
3.2.1
High Security
. 44
3.2.2
No Global Secrets
. 45
3.2.3
Separation of Privilege
. 45
3.2.4
Authorisation and Authentication of the Owner and
User
. 46
3.2.5
Dictionary Attacks
. 48
3.2.6
Cryptographic Algorithms
. 49
3.2.7
Isolation of Processes
. 50
3.2.8
Certification
. 51
3.3
Innovations in Trusted Platforms
. 57
3.3.1
General Principles
. 59
3.3.2
Roots of Trust
. 61
3.3.3
Platform Configuration Registers
. 66
3.3.4
Authenticated/Measured Boot
. 66
3.3.5
Authenticated/Measured Secure Boot
. 67
3.3.6
Protected Storage, Data Backup and Recovery
. 67
3.3.7
Attestation
. 72
3.3.8
Physical Presence and Provisioning Authorisation
. 74
3.3.9
Recognising and Identifying a Trusted Platform
. 77
3.4
Types of Trusted Platform
. 84
3.4.1
Personal Computers
. 84
3.4.2
Servers and Data Centres
. 86
3.4.3
Mobile Phones
. 86
3.4.4
Appliances
. 91
3.5
Trusted Platform Lifecycle
. 92
3.5.1
TPM Design
. 92
3.5.2
TPM Manufacture
. 93
3.5.3
Platform Manufacture
. 96
3.5.4
Platform Deployment
. 98
3.5.5
Platform Use
. 101
3.5.6
Platform Maintenance and Recovery
. 102
3.5.7
Platform Redeployment
. 105
3.5.8
TPM and Platform Revocation
. 105
3.5.9
Platform Decommissioning
. 106
References
. 106
w
Contents
4
Trusted Platform Architecture
. 109
4.
l Isolation
. 110
4.1.1
Isolation Hardware
.
Ill
4.2
Credentials
. 112
4.3
Chain of Trust
. 112
4.4
Integrity Metrics
. 115
4.5
Platform Configuration Registers
. 116
4.6
Audit
. 118
4.7
Verifying the State of a Trusted Platform
. 118
4.8
Trusted Platform Module
. 119
4.9
Locality
. 122
4.10
Peripherals
. 123
4.10.1
Trusted Drives
. 123
4.11
TPM Software Interface
. 124
4.12
Virtualisation
. 126
4.12.1
Hosts of Virtualised Trusted Platforms
. 127
4.12.2
Virtualised Trusted Platforms
. 127
4.12.3
TPM
Virtualisation
. 128
References
. 129
5
TPM2 Requirements
. 131
5.1
Controllability and Privacy
. 131
5.1.1
Controllability
. . 132
5.1.2
Privacy
. 135
5.2
Protecting the Platform's Services
. 135
5.3
Cryptographic Agility
. 136
5.4
The Commercial Environment
. 139
5.5
What Works, and What Doesn't Work
. 140
5.6
What's Unpopular
. 142
5.7
Platform Manufacturer Requirements
. 143
5.8
Hypervisor and OS Enhancements
. 147
5.9
Other Considerations
. 149
Reference
. 150
6
TPM2 Operation
. 151
6.1
TPM2 and Its Host Platform
. 155
6.2
Using TPM2 Instead of TPMvl.2
. 157
7
Initialising TPM2
. 173
7.1
Manufacture
. 173
7.1.1
Providing TPM Endorsement
. 173
7.1.2
Providing Platform Credentials
. 175
7.1.3
Providing a Trusted Computing Base
. 175
7.1.4
TCB Authorisation Requirements
. 177
7.1.5
Storing TCB Keys in the TPM
. 178
xvi Contents
7.1.6
Storing
ТСВ
data in the TPM
. 179
7.1.7
Provisioning Platform Configuration Registers
. 181
7.1.8
Allowing "Physical Presence" Authorisation
. 183
7.2
Booting the Platform
. 184
7.2.1
Initialising the TPM
. 184
7.2.2
Ensuring that the Primary TCB can Manage
the TPM
. 186
7.2.3
Testing the TPM
. 187
7.2.4
Using the TPM to Assist the TCB
. 187
7.2.5
Enabling the Customer to Control the TPM via the
Primary TCB
. 188
7.2.6
Enabling or Disabling Further Access to the TPM
. . . 189
7.3
Recording Platform History in PCRs
. 189
7.4
Run-Time Initialisation
. 192
7.5
Late Launch Environments
. 193
8
Managing TPM2
. 197
8.1
Obtaining Management Information
. 197
8.2
Keeping TPM Data Outside the TPM
. 200
8.2.1
Short-Term Cached TPM Data
. 204
8.2.2
Long-Term Cached TPM Data
. 209
8.3
Dictionary Attacks
. 214
8.4
Auditing Commands
. 218
8.5
Clock and Timer
. 221
8.5.1
Clock Functionality
. 221
8.5.2
Timer Functionality
. 222
8.6
Platform Shutdown
. 222
9
Accessing Keys and Data in TPM2
. 225
9.1
Names and QualifiedNames
. 225
9.2
Session Basics
. 226
9.3
HMAC Sessions
. 228
9.3.1
Freshness Nonces in HMAC Sessions
. 228
9.3.2
Binding and Salting HMAC Sessions
. 229
9.3.3
SessionKeys in HMAC Sessions
. 230
9.3.4
HMAC Checksums on Commands and Responses
. . . 231
9.3.5
Encrypting Command Parameters and Response
Parameters
. 232
9.3.6
Auditing HMAC Sessions
. 233
9.4
Authorisation Roles
. 235
9.5
Authorisation Session Types
. 236
9.6
Plain Authorisation
. 238
9.6.1
Plain Authorisation Without a Session
. 239
9.6.2
Plain Authorisation with HMAC Sessions
. 239
Contents
xvii
9.7
Policy Authorisation
. 240
9.7.1
Composing a Policy
. 240
9.7.2
Enumerating a Policy
. 249
9.7.3
Assigning a Policy
. 252
9.7.4
Executing a Policy
. 252
10
Customer Configuration of TPM2 and Its Host Platform
. 255
10.1
Customer Responsibilities
. 255
10.2
Provisioning
. 257
Ю.З
Setting up NV Storage
. 260
10.4
Assigning Physical Presence Gating to Commands
. 264
10.5
Assigning Personal Endorsement Keys
. 265
10.6
Assigning Platform Identities
. 267
10.6.1
Identities with Some Privacy Risk but Low
Complexity
. 268
10.6.2
Identities with Intermediate Privacy Risk, but
intermediate Complexity
. 270
10.6.3
Identities with No Known Privacy Risk, but Higher
Complexity
. 273
Reference
. 275
Π
Starting to Use TPM2
. 277
11.1
Testing TPM2
. 278
1
1
.2
Creating and Obtaining Random Numbers
. 279
11.3
Starting a Key Hierarchy
. 279
11.4
Populating a Key Hierarchy by Creating Keys
. 284
11.5
Populating a Key Hierarchy by Importing Keys
. 290
11.6
Making a Key from an External Hierarchy Ready for Use
. 290
1
1.7
Making an External Public Key or Plaintext Key
Ready for Use
. 291
11.8
Duplicating a Key
. 292
11.9
Embedding and Ejecting Keys
. 294
11.10
Reading the Public Part of a Loaded Key
. 295
11.11
Changing Authorisation Values
. 295
11.12
Encrypting and Sealing Data
. 297
1
J
.13
Decrypting Data and Unsealing Data
. 300
11.14
Signing
. 301
11.15
Verifying Signatures
. 304
Π
. 16
Obtaining PCR Values
. ,., . . , , 305
11.17
Certifying Key Creation
. 309
11.18
Cross Certification of Keys
., . . . 314
11.19
Certifying Sequences of Commands
. 319
11.20
Certifying the Usage of Commands
. 32?.
1
J
.21
Certifying TPM Time, Resets, and TPM Firmware Version
. . . 326
і
1.22
Storing Data in
N V
Storage
. 330
xviii Contents
11.23
Certifying
NV
Storage
. 333
11.24
Using TPM2 as an Ordinary Cryptographic Service
. 337
12
Direct Anonymous Attestation (DAA) in More Depth
. 339
12.1
The Concept of General Anonymous Digital Signatures
. 339
12.2
The Concept of DAA
. 341
12.3
The Setup Algorithm
. 343
12.4
The DAA Join Protocol
. 344
12.5
The Sign/Verify Protocol
. 346
12.6
The Link Algorithm
. 348
12.7
Revocation Considerations
. 348
12.8
Discussion on DAA Security Levels
. 350
References
. 351
13
Machine
Virtualisation,
Virtual Machines, and TPMs
. 353
13.1
Introduction
. 353
13.2
Machine
Virtualisation
and Security
. 354
13.3
Containment and Isolation
. . 354
13.4
Robust Control and Introspection Point
. 355
13.5
Small Code Base
. 355
13.6
Examples of Hypervisor-Based Enhanced Security
. 356
13.6.1
The TPM and Supporting Machine
Virtualisation
. . . 357
13.6.2
Additional Chipset and CPU Hardware Extensions
. . . 358
13.6.3
Machine
Virtualisation
and Supporting the TPM
. 359
13.6.4
Challenges Around TPM and
Virtualisation
. 360
13.6.5
Summary
. 360
References
. 360
Index
. 361 |
any_adam_object | 1 |
author | Proudler, Graeme Chen, Liqun Dalton, Chris |
author_GND | (DE-588)174012950 |
author_facet | Proudler, Graeme Chen, Liqun Dalton, Chris |
author_role | aut aut aut |
author_sort | Proudler, Graeme |
author_variant | g p gp l c lc c d cd |
building | Verbundindex |
bvnumber | BV041994684 |
classification_rvk | SR 860 ST 277 |
ctrlnum | (OCoLC)902651500 (DE-599)DNB1053174071 |
discipline | Informatik |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nam a2200000 c 4500</leader><controlfield tag="001">BV041994684</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20171208</controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">140725s2014 sz ad|| |||| 00||| eng d</controlfield><datafield tag="016" ind1="7" ind2=" "><subfield code="a">1053174071</subfield><subfield code="2">DE-101</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">3319087436</subfield><subfield code="9">3-319-08743-6</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783319087436</subfield><subfield code="c">Gb. : EUR 90.94 (DE) (freier Pr.), EUR 93.49 (AT) (freier Pr.), sfr 113.50 (freier Pr.)</subfield><subfield code="9">978-3-319-08743-6</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)902651500</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)DNB1053174071</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakddb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">sz</subfield><subfield code="c">XA-CH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-739</subfield><subfield code="a">DE-11</subfield><subfield code="a">DE-19</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">SR 860</subfield><subfield code="0">(DE-625)143367:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 277</subfield><subfield code="0">(DE-625)143643:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">004</subfield><subfield code="2">sdnb</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Proudler, Graeme</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Trusted computing platforms</subfield><subfield code="b">TPM2.0 in context</subfield><subfield code="c">Graeme Proudler ; Liqun Chen ; Chris Dalton</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Cham [u.a.]</subfield><subfield code="b">Springer</subfield><subfield code="c">2014</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XVIII, 382 S.</subfield><subfield code="b">Ill., graph. Darst.</subfield><subfield code="c">235 mm x 155 mm</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Systemplattform</subfield><subfield code="0">(DE-588)4674460-5</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Trusted Computing</subfield><subfield code="0">(DE-588)7562931-8</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Trusted Computing</subfield><subfield code="0">(DE-588)7562931-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Systemplattform</subfield><subfield code="0">(DE-588)4674460-5</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Chen, Liqun</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)174012950</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Dalton, Chris</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Online-Ausgabe</subfield><subfield code="z">978-3-319-08744-3</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">X:MVB</subfield><subfield code="q">text/html</subfield><subfield code="u">http://deposit.dnb.de/cgi-bin/dokserv?id=4704347&prov=M&dok_var=1&dok_ext=htm</subfield><subfield code="3">Inhaltstext</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Digitalisierung UB Passau - ADAM Catalogue Enrichment</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027436850&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-027436850</subfield></datafield></record></collection> |
id | DE-604.BV041994684 |
illustrated | Illustrated |
indexdate | 2024-08-03T01:40:28Z |
institution | BVB |
isbn | 3319087436 9783319087436 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-027436850 |
oclc_num | 902651500 |
open_access_boolean | |
owner | DE-739 DE-11 DE-19 DE-BY-UBM |
owner_facet | DE-739 DE-11 DE-19 DE-BY-UBM |
physical | XVIII, 382 S. Ill., graph. Darst. 235 mm x 155 mm |
publishDate | 2014 |
publishDateSearch | 2014 |
publishDateSort | 2014 |
publisher | Springer |
record_format | marc |
spelling | Proudler, Graeme Verfasser aut Trusted computing platforms TPM2.0 in context Graeme Proudler ; Liqun Chen ; Chris Dalton Cham [u.a.] Springer 2014 XVIII, 382 S. Ill., graph. Darst. 235 mm x 155 mm txt rdacontent n rdamedia nc rdacarrier Computersicherheit (DE-588)4274324-2 gnd rswk-swf Systemplattform (DE-588)4674460-5 gnd rswk-swf Trusted Computing (DE-588)7562931-8 gnd rswk-swf Trusted Computing (DE-588)7562931-8 s Computersicherheit (DE-588)4274324-2 s Systemplattform (DE-588)4674460-5 s DE-604 Chen, Liqun Verfasser (DE-588)174012950 aut Dalton, Chris Verfasser aut Erscheint auch als Online-Ausgabe 978-3-319-08744-3 X:MVB text/html http://deposit.dnb.de/cgi-bin/dokserv?id=4704347&prov=M&dok_var=1&dok_ext=htm Inhaltstext Digitalisierung UB Passau - ADAM Catalogue Enrichment application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027436850&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Proudler, Graeme Chen, Liqun Dalton, Chris Trusted computing platforms TPM2.0 in context Computersicherheit (DE-588)4274324-2 gnd Systemplattform (DE-588)4674460-5 gnd Trusted Computing (DE-588)7562931-8 gnd |
subject_GND | (DE-588)4274324-2 (DE-588)4674460-5 (DE-588)7562931-8 |
title | Trusted computing platforms TPM2.0 in context |
title_auth | Trusted computing platforms TPM2.0 in context |
title_exact_search | Trusted computing platforms TPM2.0 in context |
title_full | Trusted computing platforms TPM2.0 in context Graeme Proudler ; Liqun Chen ; Chris Dalton |
title_fullStr | Trusted computing platforms TPM2.0 in context Graeme Proudler ; Liqun Chen ; Chris Dalton |
title_full_unstemmed | Trusted computing platforms TPM2.0 in context Graeme Proudler ; Liqun Chen ; Chris Dalton |
title_short | Trusted computing platforms |
title_sort | trusted computing platforms tpm2 0 in context |
title_sub | TPM2.0 in context |
topic | Computersicherheit (DE-588)4274324-2 gnd Systemplattform (DE-588)4674460-5 gnd Trusted Computing (DE-588)7562931-8 gnd |
topic_facet | Computersicherheit Systemplattform Trusted Computing |
url | http://deposit.dnb.de/cgi-bin/dokserv?id=4704347&prov=M&dok_var=1&dok_ext=htm http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027436850&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT proudlergraeme trustedcomputingplatformstpm20incontext AT chenliqun trustedcomputingplatformstpm20incontext AT daltonchris trustedcomputingplatformstpm20incontext |