The Virtual Bookcase for browsing and sharing reviews of books. New to this site? Read the welcome page first.

The Virtual Bookcase Home
Recent reviews
Collected book news
Welcome to this site
Add your own book

Book details of 'Trusted Computing Platforms: TCPA Technology in Context'

Cover of Trusted Computing Platforms: TCPA Technology in Context
TitleTrusted Computing Platforms: TCPA Technology in Context
Author(s)Siani Pearson, Bart Preneel, Graeme Proudler
PublishedJuly 2002
PublisherPrentice Hall PTR
Web links for this book
Search at
Wikipedia booksources
Shop for this book

Back to shelf Computer
Back to shelf Computer security info for Trusted Computing Platforms: TCPA Technology in Context

Score: score: 3.5 ****-  Vote for this book

The Virtual Bookcase Reviews of 'Trusted Computing Platforms: TCPA Technology in Context':

Reviewer Rob Slade wrote:
Part one introduces trusted platform technology, as a kind of public key infrastructure implemented in hardware. (Which begs the question: what do you do about key revocation?) Chapter one, an overview of the trusted computing platform concept, is not very clear on basic ideas beyond hardware implementation involvement and the notion of measurement, or assurance. There are usage scenarios of applications that can be done, or done better, with trusted platforms, in chapter two. Not all of these cases are convincing evidence that trusted platforms are better. The cryptographic underpinnings of trusted platforms are examined in chapter three, but it would be clearer if the basics of asymmetric cryptography were covered and standard cryptographic and certificate authority terms were used. Part two concerns trust mechanisms in a trusted platform, but is basically a list of commands. Chapter four deals with access control, to do with physical presence requirements, ownership, and authorization. Platform identification and endorsement is covered in chapter five. Chapter six discusses integrity recording, reporting, and secure boot. Protected storage of keys is in chapter seven, migration and maintenance methods in chapter eight, and other assorted functions in chapter nine. Part three reviews trusted platforms in practice and operation. Chapter ten describes the setup of a new trusted platform, chapter eleven deals with what would elsewhere be known as trust relationships, and challenging a trusted platform--authentication of a server--is in chapter twelve. Part four presents the benefits of trusted platforms, first to organizations and corporations, in chapter thirteen, and then to individuals and users, in chapter fourteen. This book is not clear, either about what TCPA (Trusted Computing Platform Alliance) technology is, nor how it can effectively be used. Although the authors occasionally admit that there may be problems with the system, there seems to be a kind of background arrogance in operation, that assumes everyone will have to use this technology, so they might was well learn the commands. copyright Robert M. Slade, 2002

Add my review for Trusted Computing Platforms: TCPA Technology in Context

Book description:

TCPA: Building computing platforms upon a solid foundation of trust. As businesses stake their very existence on the Internet, PCs, PDAs, and other key computing platforms, the trustworthiness of these platforms has become a vital concern. In response, the Trusted Computing Platform Alliance (TCPA) has delivered a complete specification for building trusted computing platforms atop trusted hardware. In Trusted Computing Platforms, leaders of the initiative illuminate TCPA for every systems developer and decision-maker. They place TCPA in context, outlining its goals, techniques, and powerful implications for the future. * What trusted computing platforms are, how they work, and what problems they will solve * Transforming standard platforms into trusted platforms cost-effectively * Scenarios for managers: TCPA applications in the security-focused business * Protected storage: how TCPA can ensure the confidentiality of stored data * Software integrity: ensuring that a system's software environment hasn't been tampered with * Trust mechanisms in a trusted platform: functional descriptions, advantages, and overhead * Trusted platforms in practice: TCPA for developers and technical professionals * How trusted platforms can be used to protect user privacy * The TCPA initiative: its history, status, and next steps forward Backed by an extraordinary range of industry leaders, TCPA offers the first complete, cost-effective, and globally applicable solution for trusted computing. Whether you develop new systems or apply them in business or government, you need to understand this technology—and with this book, you will.

Search The Virtual Bookcase

Enter a title word, author name or ISBN.

The shelves in The Virtual Bookcase

Arts and architecture (25)
Biography (24)
Business and Management (120)
Cars and driving (53)
Cartoons (45)
Children's books (180)
Computer (475)
Computer history/fun (113)
Computer networks (382)
Computer programming (215)
Computer security (272)
Cook books (89)
Fantasy (154)
Fiction (446)
Health and body (71)
History (138)
Hobby (37)
Horror (65)
Humorous books (52)
Literature (57)
Operating systems (94)
Outdoor camping (162)
Outdoors (236)
Politics (85)
Privacy (61)
Psychology (55)
Religion (17)
Science (113)
Science Fiction (156)
Self-help books (56)
Technology (14)
Travel guides (308)
War and weapons (29)
World Wide Web (213)
Zen (5)
Other books (89)

The Virtual Bookcase is created and maintained by Koos van den Hout. Contact e-mail
Site credits
Copyright © 2000-2018 Koos van den Hout / The Virtual Bookcase Copyright and privacy statement