Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the intricacies of TPM 2.0 authorization policies in this 38-minute conference talk by Kenneth Goldman from IBM, presented at a Linux Foundation event. Delve into the design of a low-cost, resource-constrained device that offers a comprehensive set of authorizations despite limited RAM. Learn about the overall structure of TPM authorization policies, their calculation methods, and satisfaction criteria. Examine various policy statements and their practical applications through real-world use cases. Conclude with an in-depth analysis of a complex scenario that pushes the boundaries of the TPM's original design, showcasing the system's adaptability and potential for unforeseen applications.