Trusted Computing Platforms

Trusted Computing Platforms : TCPA Technology in Context

By (author) 

List price: US$49.99

Currently unavailable

We can notify you when this item is back in stock

Add to wishlist

AbeBooks may have this title (opens in new window).

Try AbeBooks


Trusted computing platforms are normal, open computer platforms (PC, server, printer, pda, mobile phone, etc) that have been modified to maintain privacy. This book explains Trusted Platform technology, a breakthrough in the field of computer security. It also provides an accessible introduction to a new industry standard in this space, recently introduced by the Trusted Computing Platform Alliance (TCPA), comprising the founding members HP, IBM, Microsoft, Compaq and Intel, as well as an extensive membership including Motorola, Cisco, Dell and AMD. This book explains the concept of the Trusted Platform, explores its implications, and illustrates the potential of the new technology using a variety of scenarios relevant to everyday business usage. Even established security professionals will not be familiar with these radical new concepts. Split into four parts, the first gives an overview of Trusted Platform technology, the second explains the TCPA specification, the third shows how Trusted Platforms can be built and used, and the fourth explores how this technology can be extended in the worlds of personal and business computing.
show more

Product details

  • Hardback | 352 pages
  • 182.88 x 236.22 x 30.48mm | 725.74g
  • Prentice Hall
  • Upper Saddle River, United States
  • English
  • 0130092207
  • 9780130092205
  • 1,786,675

Back cover copy

TCPA: Building computing platforms upon a solid foundation of trust.

As businesses stake their very existence on the Internet, PCs, PDAs, and other key computing platforms, the trustworthiness of these platforms has become a vital concern. In response, the Trusted Computing Platform Alliance (TCPA) has delivered a complete specification for building trusted computing platforms atop trusted hardware. In Trusted Computing Platforms, leaders of the initiative illuminate TCPA for every systems developer and decision-maker. They place TCPA in context, outlining its goals, techniques, and powerful implications for the future.

What trusted computing platforms are, how they work, and what problems they will solveTransforming standard platforms into trusted platforms cost-effectively Scenarios for managers: TCPA applications in the security-focused businessProtected storage: how TCPA can ensure the confidentiality of stored dataSoftware integrity: ensuring that a system's software environment hasn't been tampered with Trust mechanisms in a trusted platform: functional descriptions, advantages, and overheadTrusted platforms in practice: TCPA for developers and technical professionalsHow trusted platforms can be used to protect user privacy The TCPA initiative: its history, status, and next steps forward

Backed by an extraordinary range of industry leaders, TCPA offers the first complete, cost-effective, and globally applicable solution for trusted computing. Whether you develop new systems or apply them in business or government, you need to understand this technology--and with this book, you will.
show more

Table of contents

(NOTE: Each chapter concludes with Summary.)




About the Authors.

1. Trusted (Computing) Platforms: An Overview.

Summary of Trusted Platform Concepts. Why Are Trusted Platforms 'Trusted'? The Value of Trusted Platforms. The Main Features of Trusted Platforms. When All Platforms Are Trusted Platforms.

2. Usage Scenarios.

Straightforward Application of TCPA Trusted Platforms. Speculative Use of Trusted Platforms.

3. Key Components of Trusted Platform Technology.

Special Properties of Trusted Platforms. Roots of Trust. Trusted Platform Architectural Adaptations. Integrity. Identity. Protected Storage. Secure Boot and Authenticated Boot Processes.


4. Access Control-Ownership, Enabling, and Authorization.

Enabling, Activating, and Owning a TPM. Cryptographic Authorization. Descriptions of TPM Capabilities.

5. Platform Identification and Certification.

Platform Endorsement. Attestation for Platform Identity Mechanisms. Generating a Trusted Platform Module Identity. Signing with TPM Identities. TPM Capabilities.

6. Integrity Recording, Reporting, and Secure Boot.

Platform Configuration Register (PCR). Data Integrity Registers. TPM Capabilities.

7. Protected Storage.

Concept of Protected Storage. Functions of Protected Storage.

8. Migration and Maintenance Mechanisms.

The Concepts of Migration and Maintenance. Migration. Maintenance. TPM Capabilities.

9. Conventional Security Functions and Assorted Host Functions.

Conventional Security Services. Capabilities. Auditing the TPM.


10. Bringing a Trusted Platform to Life.

Building the Bases. Setting Up the Platform. Managing Authorization in the Key Hierarchy. On-Going Platform Support.

11. Building Trust.

In TCPA We Trust. Trusting the Roots. Trusting the Platform.

12. Challenging a Trusted Platform.

Communication with a Trusted Platform. Example.


13. Corporate Deployment of Trusted Platforms.

Overall Architecture. Deployment.

14. The Trusted Platform in Front of You.

Establishing Users' Trust in Their TPs. Trusted Signing. Multiple Smart Cards. Dedicated Trusted States.

Appendix A: Brief History of TCPA.

Evolution of TCPA. About TCPA. Choice of Platform. Further Information.

Appendix B: Trust Models and the E-Commerce Domain.

Social Models of Trust. Trust in E-Commerce. Benefits for a Company in Being Associated with Trust. Conclusions.

Appendix C: Basic Cryptographic Primitives Used in the TCPA Specification.

Basic Security Services. Basic Cryptographic Primitives.

show more

About Pearson Education

About the Editor

DR. SIANI PEARSON is a Research Scientist at Hewlett Packard's Trusted e-Services Lab and has been a key member of the HP Labs team involved in founding and developing the Trusted Computer Platform Alliance (TCPA). She holds a Ph.D. in automated theorem proving at Edinburgh University and earned a fellowship at Cambridge University working in the same field. For the past four years, her research has focused on computer security, trust, and privacy.

With contributions from:

Boris Balacheff
Liqun Chen
Dr. Siani Pearson
David Plaquin
Graeme Proudler
show more