YoVDO

Rich Authorization in Resource-Constrained Devices - TPM 2.0 Design and Use Cases

Offered By: Linux Foundation via YouTube

Tags

Embedded Systems Security Courses Cryptography Courses Hardware Security Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the intricacies of TPM 2.0 authorization policies in this 38-minute conference talk by Kenneth Goldman from IBM, presented at a Linux Foundation event. Delve into the design of a low-cost, resource-constrained device that offers a comprehensive set of authorizations despite limited RAM. Learn about the overall structure of TPM authorization policies, their calculation methods, and satisfaction criteria. Examine various policy statements and their practical applications through real-world use cases. Conclude with an in-depth analysis of a complex scenario that pushes the boundaries of the TPM's original design, showcasing the system's adaptability and potential for unforeseen applications.

Syllabus

Rich Authorization in a Resource Constrained Device - Kenneth Goldman, IBM


Taught by

Linux Foundation

Tags

Related Courses

Hardware Security
University of Maryland, College Park via Coursera
Information Security- II
Indian Institute of Technology Madras via Swayam
Ethical Hacking
Indian Institute of Technology, Kharagpur via Swayam
Cybersecurity
University of Maryland, College Park via Coursera
Learning Mobile Device Security
LinkedIn Learning