trusted computing
E653451
Trusted computing is a security approach in which hardware and software are designed to work together to enforce strict integrity, confidentiality, and attestation guarantees for computing platforms.
Statements (51)
| Predicate | Object |
|---|---|
| instanceOf |
computer security concept
ⓘ
information security approach ⓘ security architecture ⓘ |
| aimsTo |
enable remote attestation
ⓘ
enforce security policies in hardware and software ⓘ ensure data confidentiality ⓘ ensure platform integrity ⓘ |
| appliedIn |
Internet of Things devices
ⓘ
cloud computing platforms ⓘ mobile devices ⓘ personal computers ⓘ servers ⓘ virtualized environments ⓘ |
| associatedWith |
TPM 1.2
NERFINISHED
ⓘ
TPM 2.0 NERFINISHED ⓘ Trusted Platform Module NERFINISHED ⓘ hardware security modules ⓘ measured boot ⓘ platform configuration registers ⓘ remote attestation protocols ⓘ secure boot ⓘ |
| benefit |
hardware-enforced isolation of secrets
ⓘ
improved resistance to tampering ⓘ stronger guarantees of platform integrity ⓘ |
| coreConcept |
measured boot
ⓘ
remote attestation ⓘ root of trust ⓘ sealed storage ⓘ trusted execution environment ⓘ |
| criticizedFor |
potential impact on user control over devices
ⓘ
potential to enable restrictive digital rights management ⓘ privacy concerns related to attestation ⓘ |
| enables |
enforcement of digital rights management policies
ⓘ
isolation of sensitive computations ⓘ protection of cryptographic keys bound to platform state ⓘ resistance to certain malware attacks ⓘ verification of platform state by remote parties ⓘ |
| fieldOf |
computer security
ⓘ
information security ⓘ |
| implements |
hardware-based root of trust
ⓘ
integrity verification of software stack ⓘ platform configuration measurement ⓘ secure key storage ⓘ |
| reliesOn |
attestation protocols
ⓘ
cryptographic primitives ⓘ key management infrastructure ⓘ secure boot mechanisms ⓘ trusted hardware components ⓘ |
| standardizedBy | Trusted Computing Group NERFINISHED ⓘ |
| uses |
hardware-based security mechanisms
ⓘ
software-based security mechanisms ⓘ |
Referenced by (1)
Full triples — surface form annotated when it differs from this entity's canonical label.