Difference between revisions of "Trusted Computing"

From MgmtWiki
Jump to: navigation, search
(Solutions)
(Solutions)
Line 6: Line 6:
 
===Trusted Supply Chain===
 
===Trusted Supply Chain===
 
===Trusted Platform Module===
 
===Trusted Platform Module===
*[https://trustedcomputinggroup.org/ Trusted Computing Group] announced that its [https://trustedcomputinggroup.org/resource/tss-overview-common-structures-specification/ TPM 2.0 (Trusted Platform Module)] Library Specification was approved as a formal international standard under ISO/IEC (the International Organization for Standardization and the International Electrotechnical Commission). TCG has 90+ specifications and guidance documents to help build a trusted computing environment.
+
*[https://trustedcomputinggroup.org/ Trusted Computing Group] announced that its [https://trustedcomputinggroup.org/resource/tss-overview-common-structures-specification/ TPM 2.0 (Trusted Platform Module)] Library Specification was approved as a formal international standard under ISO/IEC ISO/IEC 11889:2015 (the International Organization for Standardization and the International Electrotechnical Commission). TCG has 90+ specifications and guidance documents to help build a trusted computing environment. A good suppary can be found in the [https://trustedcomputinggroup.org/resource/tss-overview-common-structures-specification/ TCG TSS 2.0 Overview and Common Structures Specification].
 
===Trusted Mobility Solutions===
 
===Trusted Mobility Solutions===
 
[https://trustedcomputinggroup.org/wp-content/uploads/TCG_TMS_Use_Cases_Mobile_v2r47.pdf TCG Trusted Mobility Solutions Work Group Use Cases – Enterprise, Financial, & NFV] was published 2018-09-26.
 
[https://trustedcomputinggroup.org/wp-content/uploads/TCG_TMS_Use_Cases_Mobile_v2r47.pdf TCG Trusted Mobility Solutions Work Group Use Cases – Enterprise, Financial, & NFV] was published 2018-09-26.

Revision as of 16:50, 10 July 2019

Full Title

Trusted Computing is a set of solutions to assure that computing devices are who they say they are and are able to keep user secrets protected from programs running on the devices.

Context

Problems

Solutions

Trusted Supply Chain

Trusted Platform Module

Trusted Mobility Solutions

TCG Trusted Mobility Solutions Work Group Use Cases – Enterprise, Financial, & NFV was published 2018-09-26.

References