O'Reilly logo

Trusted Computing Platforms: TCPA Technology in Context by Graeme Proudler, David Plaquin, Liqun Chen, Boris Balacheff, Siani Pearson

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Communication with a Trusted Platform

In today's world, and particularly with increasing device connectivity, more and more platforms interact with each other using networked facilities that are either fixed (such as LAN, modem, Internet connection, etc.), or mobile (such as GSM connection, wireless networks, UMTS, etc.). The main purpose of these interactions is either to exchange data between locations (i.e., move or copy it), or to perform a remote operation on the platform (which is an extension of the former case). Regardless of the security of the underlying protocols used for communication (whether TCP-IP, IPSEC, HTTP, HTTPS, and so on), both platforms can benefit from the TCPA features, described in previous chapters, in order to increase ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required