Summary

This chapter described how trust is created from the security features of the TPM and the overall design of a TP. These security features are converted into trustworthy information, allowing entities to build trust relationships with components of the platform. This creates transitive trust from Trusted Third Parties to such components of the platform. Using TCPA features, trust can be transferred through to other components of the platform, eventually encompassing the whole platform. Because of the way TCPA is designed, this trust can be exploited by the platform itself, both to prove its trustworthiness to other entities, and to increase the trustworthiness of its own software components.

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
18.116.62.45