Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

Linux Foundation

Rich Authorization in Resource-Constrained Devices - TPM 2.0 Design and Use Cases

Linux Foundation via YouTube

Overview

Explore the intricacies of TPM 2.0 authorization policies in this 38-minute conference talk by Kenneth Goldman from IBM, presented at a Linux Foundation event. Delve into the design of a low-cost, resource-constrained device that offers a comprehensive set of authorizations despite limited RAM. Learn about the overall structure of TPM authorization policies, their calculation methods, and satisfaction criteria. Examine various policy statements and their practical applications through real-world use cases. Conclude with an in-depth analysis of a complex scenario that pushes the boundaries of the TPM's original design, showcasing the system's adaptability and potential for unforeseen applications.

Syllabus

Rich Authorization in a Resource Constrained Device - Kenneth Goldman, IBM

Taught by

Linux Foundation

Reviews

Start your review of Rich Authorization in Resource-Constrained Devices - TPM 2.0 Design and Use Cases

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.