In TCPA We Trust

As considered in Chapter 1, the term “trust” essentially relates to human interactive behavior. The primary elements whose behavior needs to be trusted in the TCPA approach are the people who have designed and written the TCPA specification. This could be seen as the first root of trust from a human angle, so to speak. This tends to be achieved through publication of the specification work, and review by security experts and the industry at large.

Even though a TP is not a secure computer, a TCPA subsystem uses cryptographic processes and protocols that are designed to be secure. It is a generally accepted principle in the Information Security community that the only good security is security that has been vetted by many experts ...

Get Trusted Computing Platforms: TCPA Technology in Context now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.