Abstract

With the development of trusted computing, trusted computing model and trusted computing platforms are constantly changing, and becoming more and more perfect.In terms of the hardware platform, the trusted computing technology has been gradually matured.Many companies and businesses solve security problems by using trusted technologies.Trusted computing technology focuses on such as hardware, operating system and other aspects, wishing to build a complete, credible and reliable trusted platform.In this paper, the structure of the trusted platform has been described.Focus on Protected Capabilities, Integrity Measurement and Attestation which are the representative characteristics, some analysis and researches have been proposed.And analyze the main parts and priorities of the designing process of trusted platforms.

Keywords:
Trusted Computing Computer science Direct Anonymous Attestation Trusted Platform Module Trusted Network Connect Computer security Human–computer interaction

Metrics

0
Cited By
0.00
FWCI (Field Weighted Citation Impact)
11
Refs
0.05
Citation Normalized Percentile
Is in top 1%
Is in top 10%

Topics

Cloud Data Security Solutions
Physical Sciences →  Computer Science →  Information Systems
Cloud Computing and Resource Management
Physical Sciences →  Computer Science →  Information Systems
Security and Verification in Computing
Physical Sciences →  Computer Science →  Artificial Intelligence

Related Documents

BOOK-CHAPTER

Trusted Computing Platform Alliance

Scott A. Rotondo

Year: 2025 Pages: 2669-2669
BOOK-CHAPTER

Trusted Computing Platform Alliance

Scott A. Rotondo

Year: 2011 Pages: 1332-1332
JOURNAL ARTICLE

Trusted Computing Platform Alliance

Barbara Gengler

Journal:   Network Security Year: 2001 Vol: 2001 (3)Pages: 6-6
BOOK-CHAPTER

5. Trusted Computing Platform

Dengguo Feng

Year: 2017 Pages: 133-167
© 2026 ScienceGate Book Chapters — All rights reserved.