As computers are increasingly embedded, ubiquitous and wirelessly
connected, security becomes imperative. This has led to the development
of the notion of a 'trusted platform', the chief characteristic of which
is the possession of a trusted hardware element which is able to check
all or part of the software running on this platform. This enables
parties to verify the software environment running on a remote trusted
platform, and hence to have some trust that the data sent to that
machine will be processed in accordance with agreed rules.
This new text introduces recent technological developments in trusted
computing, and surveys the various current approaches to providing
trusted platforms. It also includes application examples based on recent
and ongoing research. The core of the book is based on an open workshop
on Trusted Computing, held at Royal Holloway, University of London, UK.