O'Reilly logo

Trusted Computing Platforms: TCPA Technology in Context by Graeme Proudler, David Plaquin, Liqun Chen, Boris Balacheff, Siani Pearson

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 2. Usage Scenarios

In this chapter, we bring together a variety of applications of Trusted Platforms (TPs). We start with using TPs for conventional security applications, and then describe adaptations that use special TP properties. We also give a flavor of more forward-looking applications, such as those considered further in Part 4.

First, however, it must be acknowledged that today's typical platform makes little use of security (other than for Internet communications). The features that sell platforms are the applications that provide tangible benefits to customers. Security features, when provided, are often considered obstacles to convenience and are disabled or circumvented. So why would anyone want a TP?

People agree that applications ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required