Rich Authorization in Resource-Constrained Devices - TPM 2.0 Design and Use Cases
Offered By: Linux Foundation via YouTube
Course Description
Overview
Explore the intricacies of TPM 2.0 authorization policies in this 38-minute conference talk by Kenneth Goldman from IBM, presented at a Linux Foundation event. Delve into the design of a low-cost, resource-constrained device that offers a comprehensive set of authorizations despite limited RAM. Learn about the overall structure of TPM authorization policies, their calculation methods, and satisfaction criteria. Examine various policy statements and their practical applications through real-world use cases. Conclude with an in-depth analysis of a complex scenario that pushes the boundaries of the TPM's original design, showcasing the system's adaptability and potential for unforeseen applications.
Syllabus
Rich Authorization in a Resource Constrained Device - Kenneth Goldman, IBM
Taught by
Linux Foundation
Tags
Related Courses
Hardware SecurityUniversity of Maryland, College Park via Coursera Information Security- II
Indian Institute of Technology Madras via Swayam Ethical Hacking
Indian Institute of Technology, Kharagpur via Swayam Cybersecurity
University of Maryland, College Park via Coursera Learning Mobile Device Security
LinkedIn Learning