Electronic Components Datasheet Search |
|
L12-TCPA-PALLADIUM Datasheet(PDF) 2 Page - List of Unclassifed Manufacturers |
|
L12-TCPA-PALLADIUM Datasheet(HTML) 2 Page - List of Unclassifed Manufacturers |
2 / 12 page 2 3 TCPA CONCEPTS • Reduce business risks by enabling trust in the behavior of critical information systems • Protect end user private data and information by enabling trust in end systems (unknown if current technology trajectory will lead to this result) 2 The Trusted Computing Platform Alliance (TCPA) Doomsayers claim the TCPA is the conspiracy to prevent artistry, anonymity, or assembly. Others wonder if TCPA is the conspiracy in prelude to the apocalypse, and wonder if this is the end of free computing. Some skeptics question how the TCPA will know the end has been reached and wonder if we are getting on the slippery slope to ’Big Brother’ baked into a computer. Joe Pato said that his lecture will demonstrate that TCPA is none of these. History The TCPA is an industry group started in 1998. It was founded by Compaq, HP, IBM, Intel, and Microsoft. Currently the group has 180 members from the hardware, software, communications, and security technology industries. The group is focused on defining and advancing the concept of trusted computing. Competition in the security space and the need for cheap cryptography prompted creation of this group. The companies also needed to bypass crypto export regulations, and as a result wanted to work towards this goal with other players in the field. The TCPA Charter • Provide a ubiquitous and widely adopted means to address trustworthiness of computing plat- forms • Publish an open specification for public review • Define a technology specification that can be applied to any type of computing platform 3 TCPA Concepts Definition: A platform can be trusted if it behaves in the expected manner for the intended purpose. TCPA Technology provides the mechanisms for: • Platform authentication and attestation — is this platform actually a TCPA platform? • Platform integrity reporting — has this TCPA platform been modified in any fashion? • Protected storage — enabling secure stable storage in the presence of adversaries, architecture enables root of trust that allows third parties to rely on this trust |
Similar Part No. - L12-TCPA-PALLADIUM |
|
Similar Description - L12-TCPA-PALLADIUM |
|
|
Link URL |
Privacy Policy |
ALLDATASHEET.NET |
Does ALLDATASHEET help your business so far? [ DONATE ] |
About Alldatasheet | Advertisement | Contact us | Privacy Policy | Link Exchange | Manufacturer List All Rights Reserved©Alldatasheet.com |
Russian : Alldatasheetru.com | Korean : Alldatasheet.co.kr | Spanish : Alldatasheet.es | French : Alldatasheet.fr | Italian : Alldatasheetit.com Portuguese : Alldatasheetpt.com | Polish : Alldatasheet.pl | Vietnamese : Alldatasheet.vn Indian : Alldatasheet.in | Mexican : Alldatasheet.com.mx | British : Alldatasheet.co.uk | New Zealand : Alldatasheet.co.nz |
Family Site : ic2ic.com |
icmetro.com |