Trusted computing platforms: TPM2.0 in context
Gespeichert in:
Beteiligte Personen: | , , |
---|---|
Format: | Buch |
Sprache: | Englisch |
Veröffentlicht: |
Cham [u.a.]
Springer
2014
|
Schlagwörter: | |
Links: | http://deposit.dnb.de/cgi-bin/dokserv?id=4704347&prov=M&dok_var=1&dok_ext=htm http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027436850&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
Umfang: | XVIII, 382 S. Ill., graph. Darst. 235 mm x 155 mm |
ISBN: | 3319087436 9783319087436 |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV041994684 | ||
003 | DE-604 | ||
005 | 20171208 | ||
007 | t| | ||
008 | 140725s2014 sz ad|| |||| 00||| eng d | ||
016 | 7 | |a 1053174071 |2 DE-101 | |
020 | |a 3319087436 |9 3-319-08743-6 | ||
020 | |a 9783319087436 |c Gb. : EUR 90.94 (DE) (freier Pr.), EUR 93.49 (AT) (freier Pr.), sfr 113.50 (freier Pr.) |9 978-3-319-08743-6 | ||
035 | |a (OCoLC)902651500 | ||
035 | |a (DE-599)DNB1053174071 | ||
040 | |a DE-604 |b ger |e rakddb | ||
041 | 0 | |a eng | |
044 | |a sz |c XA-CH | ||
049 | |a DE-739 |a DE-11 |a DE-19 | ||
084 | |a SR 860 |0 (DE-625)143367: |2 rvk | ||
084 | |a ST 277 |0 (DE-625)143643: |2 rvk | ||
084 | |a 004 |2 sdnb | ||
100 | 1 | |a Proudler, Graeme |e Verfasser |4 aut | |
245 | 1 | 0 | |a Trusted computing platforms |b TPM2.0 in context |c Graeme Proudler ; Liqun Chen ; Chris Dalton |
264 | 1 | |a Cham [u.a.] |b Springer |c 2014 | |
300 | |a XVIII, 382 S. |b Ill., graph. Darst. |c 235 mm x 155 mm | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
650 | 0 | 7 | |a Systemplattform |0 (DE-588)4674460-5 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Trusted Computing |0 (DE-588)7562931-8 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Trusted Computing |0 (DE-588)7562931-8 |D s |
689 | 0 | 1 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | 2 | |a Systemplattform |0 (DE-588)4674460-5 |D s |
689 | 0 | |5 DE-604 | |
700 | 1 | |a Chen, Liqun |e Verfasser |0 (DE-588)174012950 |4 aut | |
700 | 1 | |a Dalton, Chris |e Verfasser |4 aut | |
776 | 0 | 8 | |i Erscheint auch als |n Online-Ausgabe |z 978-3-319-08744-3 |
856 | 4 | 2 | |m X:MVB |q text/html |u http://deposit.dnb.de/cgi-bin/dokserv?id=4704347&prov=M&dok_var=1&dok_ext=htm |3 Inhaltstext |
856 | 4 | 2 | |m Digitalisierung UB Passau - ADAM Catalogue Enrichment |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027436850&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-027436850 |
Datensatz im Suchindex
_version_ | 1819340292926472192 |
---|---|
adam_text | Contents
Introduction
.......................................... 1
1. [
The State of Play
................................. 2
1.2
Objectives
...................................... 4
1.3
Trusted Computing Technology
....................... 6
1.4
Benefits of Trusted Computing
....................... 7
1.5
Trust, Instead of Security
........................... 9
1.5.1
Secure Computing
.......................... 9
1.5.2
Trusted Computing
......................... 10
1.6
Limitations of Trusted Computing
..................... 12
1.7
Concerns About Trusted Computing
................... 13
1.8
First Generation Trusted Computing
................... 18
References
............................................ 19
Futures for Trusted Computing
........................... 21
2.1
Trusted
Virtualisation
.............................. 21
2.1.1
Privacy Implications of Trusted
Virtualisation
...... 24
2.1.2
Virtualised Trusted Platforms
.................. 25
2.2
Future Trusted Services
............................. 26
2.2.1
Data Deletion
.............................. 26
2.2.2
Contracts and Negotiations
.................... 27
2.2.3
Single Sign-On
............................ 28
2.2.4
Trusted Software Agents
..................... 28
2.2.5
What You See Is What You Sign
............... 29
2.3
Infrastructure Requirements
........,.......,.,...,,.. 29
2.3.1
Public Key Infrastructure
..................... 29
2.3.2
Manufacture
.............................. 30
2.3.3
Upgrading TPMs
........................... 31
2.3.4
Upgrading Integrity Metrics
..........,........ 31
2.3.5
Auditing Trusted Platforms
.................... 32
2.3.6
Discovering Trusted Services
.................. 33
Xlii
xiv Contents
3 Basics
of Trusted Platforms
.............................. 37
3.1
Design Constraints, Requirements, and Motivations
........ 37
3.1.1
Legacy Platforms, Software and Infrastructure
...... 37
3.1.2
Out of the Box
............................. 38
3.1.3
Legal
.................................... 38
3.1.4
Privacy Constraints
......................... 40
3.1.5
Disaster Recovery
.......................... 41
3.2
Conventional Security in Trusted Platforms
.............. 43
3.2.1
High Security
.............................. 44
3.2.2
No Global Secrets
.......................... 45
3.2.3
Separation of Privilege
....................... 45
3.2.4
Authorisation and Authentication of the Owner and
User
.................................... 46
3.2.5
Dictionary Attacks
.......................... 48
3.2.6
Cryptographic Algorithms
.................... 49
3.2.7
Isolation of Processes
........................ 50
3.2.8
Certification
............................... 51
3.3
Innovations in Trusted Platforms
...................... 57
3.3.1
General Principles
.......................... 59
3.3.2
Roots of Trust
............................. 61
3.3.3
Platform Configuration Registers
............... 66
3.3.4
Authenticated/Measured Boot
.................. 66
3.3.5
Authenticated/Measured Secure Boot
............ 67
3.3.6
Protected Storage, Data Backup and Recovery
...... 67
3.3.7
Attestation
................................ 72
3.3.8
Physical Presence and Provisioning Authorisation
... 74
3.3.9
Recognising and Identifying a Trusted Platform
..... 77
3.4
Types of Trusted Platform
........................... 84
3.4.1
Personal Computers
......................... 84
3.4.2
Servers and Data Centres
..................... 86
3.4.3
Mobile Phones
............................. 86
3.4.4
Appliances
................................ 91
3.5
Trusted Platform Lifecycle
.......................... 92
3.5.1
TPM Design
.............................. 92
3.5.2
TPM Manufacture
.......................... 93
3.5.3
Platform Manufacture
........................ 96
3.5.4
Platform Deployment
........................ 98
3.5.5
Platform Use
.............................. 101
3.5.6
Platform Maintenance and Recovery
............. 102
3.5.7
Platform Redeployment
...................... 105
3.5.8
TPM and Platform Revocation
................. 105
3.5.9
Platform Decommissioning
.................... 106
References
............................................ 106
w
Contents
4
Trusted Platform Architecture
............................ 109
4.
l Isolation
........................................ 110
4.1.1
Isolation Hardware
..........................
Ill
4.2
Credentials
...................................... 112
4.3
Chain of Trust
................................... 112
4.4
Integrity Metrics
.................................. 115
4.5
Platform Configuration Registers
...................... 116
4.6
Audit
.......................................... 118
4.7
Verifying the State of a Trusted Platform
................ 118
4.8
Trusted Platform Module
............................ 119
4.9
Locality
........................................ 122
4.10
Peripherals
...................................... 123
4.10.1
Trusted Drives
............................. 123
4.11
TPM Software Interface
............................ 124
4.12
Virtualisation
.................................... 126
4.12.1
Hosts of Virtualised Trusted Platforms
........... 127
4.12.2
Virtualised Trusted Platforms
.................. 127
4.12.3
TPM
Virtualisation
......................... 128
References
............................................ 129
5
TPM2 Requirements
..................................... 131
5.1
Controllability and Privacy
.......................... 131
5.1.1
Controllability
............................ . 132
5.1.2
Privacy
.................................. 135
5.2
Protecting the Platform s Services
..................... 135
5.3
Cryptographic Agility
.............................. 136
5.4
The Commercial Environment
........................ 139
5.5
What Works, and What Doesn t Work
.................. 140
5.6
What s Unpopular
................................. 142
5.7
Platform Manufacturer Requirements
................... 143
5.8
Hypervisor and OS Enhancements
..................... 147
5.9
Other Considerations
............................... 149
Reference
............................................. 150
6
TPM2 Operation
....................................... 151
6.1
TPM2 and Its Host Platform
......................... 155
6.2
Using TPM2 Instead of TPMvl.2
..................... 157
7
Initialising TPM2
...................................... 173
7.1
Manufacture
..................................... 173
7.1.1
Providing TPM Endorsement
.................. 173
7.1.2
Providing Platform Credentials
................. 175
7.1.3
Providing a Trusted Computing Base
............ 175
7.1.4
TCB Authorisation Requirements
............... 177
7.1.5
Storing TCB Keys in the TPM
................. 178
xvi Contents
7.1.6
Storing
ТСВ
data in the TPM
.................. 179
7.1.7
Provisioning Platform Configuration Registers
...... 181
7.1.8
Allowing Physical Presence Authorisation
....... 183
7.2
Booting the Platform
............................... 184
7.2.1
Initialising the TPM
......................... 184
7.2.2
Ensuring that the Primary TCB can Manage
the TPM
................................. 186
7.2.3
Testing the TPM
........................... 187
7.2.4
Using the TPM to Assist the TCB
............... 187
7.2.5
Enabling the Customer to Control the TPM via the
Primary TCB
.............................. 188
7.2.6
Enabling or Disabling Further Access to the TPM
. . . 189
7.3
Recording Platform History in PCRs
................... 189
7.4
Run-Time Initialisation
............................. 192
7.5
Late Launch Environments
.......................... 193
8
Managing TPM2
....................................... 197
8.1
Obtaining Management Information
.................... 197
8.2
Keeping TPM Data Outside the TPM
................... 200
8.2.1
Short-Term Cached TPM Data
................. 204
8.2.2
Long-Term Cached TPM Data
................. 209
8.3
Dictionary Attacks
................................ 214
8.4
Auditing Commands
............................... 218
8.5
Clock and Timer
.................................. 221
8.5.1
Clock Functionality
......................... 221
8.5.2
Timer Functionality
......................... 222
8.6
Platform Shutdown
................................ 222
9
Accessing Keys and Data in TPM2
......................... 225
9.1
Names and QualifiedNames
.......................... 225
9.2
Session Basics
................................... 226
9.3
HMAC Sessions
.................................. 228
9.3.1
Freshness Nonces in HMAC Sessions
............ 228
9.3.2
Binding and Salting HMAC Sessions
............ 229
9.3.3
SessionKeys in HMAC Sessions
................ 230
9.3.4
HMAC Checksums on Commands and Responses
. . . 231
9.3.5
Encrypting Command Parameters and Response
Parameters
................................ 232
9.3.6
Auditing HMAC Sessions
..................... 233
9.4
Authorisation Roles
............................... 235
9.5
Authorisation Session Types
......................... 236
9.6
Plain Authorisation
................................ 238
9.6.1
Plain Authorisation Without a Session
............ 239
9.6.2
Plain Authorisation with HMAC Sessions
......... 239
Contents
xvii
9.7
Policy Authorisation
............................... 240
9.7.1
Composing a Policy
......................... 240
9.7.2
Enumerating a Policy
........................ 249
9.7.3
Assigning a Policy
.......................... 252
9.7.4
Executing a Policy
.......................... 252
10
Customer Configuration of TPM2 and Its Host Platform
........ 255
10.1
Customer Responsibilities
........................... 255
10.2
Provisioning
..................................... 257
Ю.З
Setting up NV Storage
............................. 260
10.4
Assigning Physical Presence Gating to Commands
......... 264
10.5
Assigning Personal Endorsement Keys
.................. 265
10.6
Assigning Platform Identities
......................... 267
10.6.1
Identities with Some Privacy Risk but Low
Complexity
............................... 268
10.6.2
Identities with Intermediate Privacy Risk, but
intermediate Complexity
..................... 270
10.6.3
Identities with No Known Privacy Risk, but Higher
Complexity
............................... 273
Reference
............................................. 275
Π
Starting to Use TPM2
................................... 277
11.1
Testing TPM2
.................................... 278
1
1
.2
Creating and Obtaining Random Numbers
............... 279
11.3
Starting a Key Hierarchy
............................ 279
11.4
Populating a Key Hierarchy by Creating Keys
............ 284
11.5
Populating a Key Hierarchy by Importing Keys
........... 290
11.6
Making a Key from an External Hierarchy Ready for Use
.... 290
1
1.7
Making an External Public Key or Plaintext Key
Ready for Use
.................................... 291
11.8
Duplicating a Key
................................. 292
11.9
Embedding and Ejecting Keys
........................ 294
11.10
Reading the Public Part of a Loaded Key
................ 295
11.11
Changing Authorisation Values
....................... 295
11.12
Encrypting and Sealing Data
......................... 297
1
J
.13
Decrypting Data and Unsealing Data
................... 300
11.14
Signing
........................................ 301
11.15
Verifying Signatures
............................... 304
Π
. 16
Obtaining PCR Values
......... ,.............., . . , , 305
11.17
Certifying Key Creation
............................ 309
11.18
Cross Certification of Keys
......................, . . . 314
11.19
Certifying Sequences of Commands
.................... 319
11.20
Certifying the Usage of Commands
.................... 32?.
1
J
.21
Certifying TPM Time, Resets, and TPM Firmware Version
. . . 326
і
1.22
Storing Data in
N V
Storage
.......................... 330
xviii Contents
11.23
Certifying
NV
Storage
............................. 333
11.24
Using TPM2 as an Ordinary Cryptographic Service
........ 337
12
Direct Anonymous Attestation (DAA) in More Depth
........... 339
12.1
The Concept of General Anonymous Digital Signatures
..... 339
12.2
The Concept of DAA
.............................. 341
12.3
The Setup Algorithm
............................... 343
12.4
The DAA Join Protocol
............................. 344
12.5
The Sign/Verify Protocol
............................ 346
12.6
The Link Algorithm
............................... 348
12.7
Revocation Considerations
.......................... 348
12.8
Discussion on DAA Security Levels
................... 350
References
............................................ 351
13
Machine
Virtualisation,
Virtual Machines, and TPMs
.......... 353
13.1
Introduction
..................................... 353
13.2
Machine
Virtualisation
and Security
................... 354
13.3
Containment and Isolation
.......................... . 354
13.4
Robust Control and Introspection Point
................. 355
13.5
Small Code Base
................................. 355
13.6
Examples of Hypervisor-Based Enhanced Security
......... 356
13.6.1
The TPM and Supporting Machine
Virtualisation
. . . 357
13.6.2
Additional Chipset and CPU Hardware Extensions
. . . 358
13.6.3
Machine
Virtualisation
and Supporting the TPM
.... 359
13.6.4
Challenges Around TPM and
Virtualisation
........ 360
13.6.5
Summary
................................. 360
References
............................................ 360
Index
................................................... 361
|
any_adam_object | 1 |
author | Proudler, Graeme Chen, Liqun Dalton, Chris |
author_GND | (DE-588)174012950 |
author_facet | Proudler, Graeme Chen, Liqun Dalton, Chris |
author_role | aut aut aut |
author_sort | Proudler, Graeme |
author_variant | g p gp l c lc c d cd |
building | Verbundindex |
bvnumber | BV041994684 |
classification_rvk | SR 860 ST 277 |
ctrlnum | (OCoLC)902651500 (DE-599)DNB1053174071 |
discipline | Informatik |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02077nam a2200469 c 4500</leader><controlfield tag="001">BV041994684</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20171208 </controlfield><controlfield tag="007">t|</controlfield><controlfield tag="008">140725s2014 sz ad|| |||| 00||| eng d</controlfield><datafield tag="016" ind1="7" ind2=" "><subfield code="a">1053174071</subfield><subfield code="2">DE-101</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">3319087436</subfield><subfield code="9">3-319-08743-6</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783319087436</subfield><subfield code="c">Gb. : EUR 90.94 (DE) (freier Pr.), EUR 93.49 (AT) (freier Pr.), sfr 113.50 (freier Pr.)</subfield><subfield code="9">978-3-319-08743-6</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)902651500</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)DNB1053174071</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakddb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">sz</subfield><subfield code="c">XA-CH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-739</subfield><subfield code="a">DE-11</subfield><subfield code="a">DE-19</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">SR 860</subfield><subfield code="0">(DE-625)143367:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 277</subfield><subfield code="0">(DE-625)143643:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">004</subfield><subfield code="2">sdnb</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Proudler, Graeme</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Trusted computing platforms</subfield><subfield code="b">TPM2.0 in context</subfield><subfield code="c">Graeme Proudler ; Liqun Chen ; Chris Dalton</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Cham [u.a.]</subfield><subfield code="b">Springer</subfield><subfield code="c">2014</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XVIII, 382 S.</subfield><subfield code="b">Ill., graph. Darst.</subfield><subfield code="c">235 mm x 155 mm</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Systemplattform</subfield><subfield code="0">(DE-588)4674460-5</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Trusted Computing</subfield><subfield code="0">(DE-588)7562931-8</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Trusted Computing</subfield><subfield code="0">(DE-588)7562931-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Systemplattform</subfield><subfield code="0">(DE-588)4674460-5</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Chen, Liqun</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)174012950</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Dalton, Chris</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Online-Ausgabe</subfield><subfield code="z">978-3-319-08744-3</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">X:MVB</subfield><subfield code="q">text/html</subfield><subfield code="u">http://deposit.dnb.de/cgi-bin/dokserv?id=4704347&prov=M&dok_var=1&dok_ext=htm</subfield><subfield code="3">Inhaltstext</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Digitalisierung UB Passau - ADAM Catalogue Enrichment</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027436850&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-027436850</subfield></datafield></record></collection> |
id | DE-604.BV041994684 |
illustrated | Illustrated |
indexdate | 2024-12-20T16:59:40Z |
institution | BVB |
isbn | 3319087436 9783319087436 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-027436850 |
oclc_num | 902651500 |
open_access_boolean | |
owner | DE-739 DE-11 DE-19 DE-BY-UBM |
owner_facet | DE-739 DE-11 DE-19 DE-BY-UBM |
physical | XVIII, 382 S. Ill., graph. Darst. 235 mm x 155 mm |
publishDate | 2014 |
publishDateSearch | 2014 |
publishDateSort | 2014 |
publisher | Springer |
record_format | marc |
spellingShingle | Proudler, Graeme Chen, Liqun Dalton, Chris Trusted computing platforms TPM2.0 in context Systemplattform (DE-588)4674460-5 gnd Trusted Computing (DE-588)7562931-8 gnd Computersicherheit (DE-588)4274324-2 gnd |
subject_GND | (DE-588)4674460-5 (DE-588)7562931-8 (DE-588)4274324-2 |
title | Trusted computing platforms TPM2.0 in context |
title_auth | Trusted computing platforms TPM2.0 in context |
title_exact_search | Trusted computing platforms TPM2.0 in context |
title_full | Trusted computing platforms TPM2.0 in context Graeme Proudler ; Liqun Chen ; Chris Dalton |
title_fullStr | Trusted computing platforms TPM2.0 in context Graeme Proudler ; Liqun Chen ; Chris Dalton |
title_full_unstemmed | Trusted computing platforms TPM2.0 in context Graeme Proudler ; Liqun Chen ; Chris Dalton |
title_short | Trusted computing platforms |
title_sort | trusted computing platforms tpm2 0 in context |
title_sub | TPM2.0 in context |
topic | Systemplattform (DE-588)4674460-5 gnd Trusted Computing (DE-588)7562931-8 gnd Computersicherheit (DE-588)4274324-2 gnd |
topic_facet | Systemplattform Trusted Computing Computersicherheit |
url | http://deposit.dnb.de/cgi-bin/dokserv?id=4704347&prov=M&dok_var=1&dok_ext=htm http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027436850&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT proudlergraeme trustedcomputingplatformstpm20incontext AT chenliqun trustedcomputingplatformstpm20incontext AT daltonchris trustedcomputingplatformstpm20incontext |