Skip to main content

Trusted Computing Platforms

TPM2.0 in Context

  • Book
  • © 2014

Overview

  • Valuable reference for industrial researchers and practitioners, IT managers and graduate students in information security
  • Authors among leading industrial researchers and members of related specification and standardisation committees
  • Provides a record of origins and justifications for trusted platforms and trusted computing
  • Includes supplementary material: sn.pub/extras

This is a preview of subscription content, log in via an institution to check access.

Access this book

eBook USD 139.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 179.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book USD 179.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

Licence this eBook for your library

Institutional subscriptions

Table of contents (13 chapters)

Keywords

About this book

In this book the authors first describe the background of trusted platforms and trusted computing and speculate about the future. They then describe the technical features and architectures of trusted platforms from several different perspectives, finally explaining second-generation TPMs, including a technical description intended to supplement the Trusted Computing Group's TPM2 specifications. The intended audience is IT managers and engineers and graduate students in information security.

Authors and Affiliations

  • Hewlett-Packard Laboratories, Bristol, United Kingdom

    Graeme Proudler, Chris Dalton

  • Hewlett Packard Laboratories, Bristol, United Kingdom

    Liqun Chen

About the authors

Graeme Proudler was a researcher at Hewlett-Packard Laboratories in Bristol, UK, and the Chair of the Trusted Computing Group’s Technical Committee until November 2013. He was the technical lead of the HP Labs research group that contributed to Trusted Computing Platform Alliance specifications, a founder member of the TCPA Technical Committee and original editor of the TCPA main (TPM) specification. His research interests include information security, networking and mobile communications.

Dr. Liqun Chen is a researcher at Hewlett-Packard Laboratories in Bristol, UK. She has developed a number of well-known cryptographic schemes, some of which were designed for and are implemented in the TPM. She has an extensive publication record in cryptography and information security and holds 38 granted US patents in these areas. She has served as editor or co-editor for five ISO/IEC standard documents in cryptography and serves on boards for related academic journals and conferences.

Christopher Dalton is a Principal Research Engineer within HP Labs, UK. His research interests include platform security (fixed and mobile), operating systems, network security and virtualisation, as well as a wider interest in distributed systems. He has been responsible for many successful technology transfers from research through to commercial products. He has published influential papers in the areas of systems, network security and virtualisation and has generated a number of patents in areas including novel low-level security features and efficient network virtualisation mechanisms.

Bibliographic Information

  • Book Title: Trusted Computing Platforms

  • Book Subtitle: TPM2.0 in Context

  • Authors: Graeme Proudler, Liqun Chen, Chris Dalton

  • DOI: https://doi.org/10.1007/978-3-319-08744-3

  • Publisher: Springer Cham

  • eBook Packages: Computer Science, Computer Science (R0)

  • Copyright Information: Springer International Publishing Switzerland 2014

  • Hardcover ISBN: 978-3-319-08743-6Published: 21 January 2015

  • Softcover ISBN: 978-3-319-35690-7Published: 24 September 2016

  • eBook ISBN: 978-3-319-08744-3Published: 08 January 2015

  • Edition Number: 1

  • Number of Pages: XVIII, 382

  • Number of Illustrations: 7 b/w illustrations, 2 illustrations in colour

  • Topics: Systems and Data Security, Cryptology, Communications Engineering, Networks, Security Science and Technology

Publish with us