Download now Free registration required
The basic technological building blocks of the TCG architecture seem to be stabilizing. As a result, the authors believe that the focus of the Trusted Computing (TC) discipline must naturally shift from the design and implementation of the hardware root of trust (and the subsequent trust chain) to the higher-level application policies. Such policies must build on these primitives to express new sets of security goals. They highlight the relationship between enforcing these types of policies and debugging, since both activities establish the link between expected and actual application behavior.
- Format: PDF
- Size: 316.3 KB