第一章TCG标准规范概述-创新互联-成都创新互联网站建设

关于创新互联

多方位宣传企业产品与服务 突出企业形象

公司简介 公司的服务 荣誉资质 新闻动态 联系我们

第一章TCG标准规范概述-创新互联

可信计算组织(Ttrusted Computing Group,TCG)是一个非盈利的工业标准组织,它的宗旨是加强在相异计算机平台上的计算环境的安全性。TCG于2003年春成立,并采纳了由可信计算平台联盟(the Trusted Computing Platform Alliance,TCPA)所开发的规范。现在的规范都不是最终稿,都还在不断的更新中,比如:TPM的规范就从原来的v1.0更新到v1.2,现在还在不断的修订。

创新互联公司是一家集网站建设,长顺企业网站建设,长顺品牌网站建设,网站定制,长顺网站建设报价,网络营销,网络优化,长顺网站推广为一体的创新建站企业,帮助传统企业提升企业形象加强企业竞争力。可充分满足这一群体相比中小企业更为丰富、高端、多元的互联网需求。同时我们时刻保持专业、时尚、前沿,时刻以成就客户成长自我,坚持不断学习、思考、沉淀、净化自己,让我们为更多的企业打造出实用型网站。一、工作组规范概览  1.Available

这部分是我们目前能够下载到的部分规范。

├── Cloud 工作组
│   ├── Cloud-Computing-and-Security-Whitepaper_July29.2010.pdf
│   ├── TMI_Reference_Model_V1_00R1_0.pdf
│   ├── TMI_Trust_Assessment_Framework-v2r48.pdf
│   └── TMI_Use_Cases_V1.1_Final.pdf
├── Cyber Resillient Technologies
│   └── Cyber-Resilient-Module-and-Building-Block-Requirements-V1-R0.2_pub.pdf
├── DICE工作组
│   ├── DICE-Attestation-Architecture-r23-final.pdf
│   ├── DICE-Certificate-Profiles-r01_pub.pdf
│   ├── DICE-Layering-Architecture-r19_pub.pdf
│   ├── Foundational-Trust-for-IOT-and-Resource-Constrained-Devices.pdf
│   ├── Hardware-Requirements-for-Device-Identifier-Composition-Engine-r78_For-Publication.pdf
│   ├── TCG-DICE-Arch-Implicit-Identity-Based-Device-Attestation-v1-rev93.pdf
│   ├── TCG-Endorsement-Architecture-for-Devices-V1-R38_pub.pdf
│   └── TCG_DICE_SymIDAttest_v1_r0p95_pub-1.pdf
├── Embedded Systems 工作组
│   ├── Establishing-Network-Equipment-Security_rev-July-21-2017.pdf
│   ├── Secure-Embedded-Platforms-with-Trusted-Computing-Automotive-and-Other-Systems-in-the-Internet-of-Things-Must-Be-Protected.pdf
│   ├── TCG-Architects-Guide_2018_FC01_web.pdf
│   ├── TCG-Guidance-for-Securing-Resource-Constrained-Devices-v1r22.pdf
│   ├── TCG-Secure-Update-of-SW-and-FW-on-Devices-v1r72_pub.pdf
│   ├── TCG_Guidance_for_Securing_Industrial_Control_Systems_v1_r109_pub10jan2022.pdf
│   ├── TCG_Guidance_for_Securing_NetEq_1_0r29.pdf
│   ├── TCG_TPM_2.0_Automotive_Thin_Profile_v1.1-r15.pdf
│   └── TCG_UseCases_MARS_v1p0_r27_pub.pdf
├── Industrial 工作组
│   ├── 04_TCG_StdsSecureEquip_2018_Web.pdf
│   ├── ICS-Security-Using-TNC-Technology-Architects-Guide.pdf
│   ├── Standards-for-Securing-Industrial-Equipment.pdf
│   ├── TCG_Guidance_for_Securing_Industrial_Control_Systems_v1_r109_pub10jan2022.pdf
│   └── TNC_IFMAP_v2_2r10.pdf
├── Infrastructure 工作组
│   ├── CoreIntegrity_Schema_Specification_v2.0.r5.pdf
│   ├── Credential_Profiles_V1.2_Level2_Revision8.pdf
│   ├── DICE-Attestation-Architecture-r23-final.pdf
│   ├── DICE-Certificate-Profiles-r01_pub.pdf
│   ├── DICE-Layering-Architecture-r19_pub.pdf
│   ├── IWG-IF-PTS_v1.pdf
│   ├── IWG-SimpleObject_Schema_Specification_v1.pdf
│   ├── IWG-Verification_Result_v1_0.pdf
│   ├── IWG_ArchitecturePartII_v1.0.pdf
│   ├── IWG_Architecture_v1_0_r1.pdf
│   ├── IWG_Backup_and_Migration_Services_1-00_1-00.pdf
│   ├── IWG_CMC_Profile_Cert_Enrollment_v1_r7.pdf
│   ├── IWG_EK_Platform_Enrollment_v1_0_r5_Published.pdf
│   ├── IWG_Platform_Certificate_Profile_v1p1_r19_pub_fixed.pdf
│   ├── IWG_SKAE_Extension_1-00.pdf
│   ├── IWG_Security_Qualities_Schema_v1_1_r07.pdf
│   ├── IWG_specs_FAQ_May_14_final.pdf
│   ├── Reference_Manifest_Schema_Specification_v2.0.r5.pdf
│   ├── SMBIOS-Component-Class-Registry_v1.01_finalpublication.pdf
│   ├── TCG-Platform-Attribute-Credential-Profile-Version-1.0.pdf
│   ├── TCG-TPM-v2.0-Provisioning-Guidance-Published-v1r1.pdf
│   ├── TCG_1_4_Architecture_Overview.pdf
│   ├── TCG_IWG_CEL_v1_r0p41_pub.pdf
│   ├── TCG_IWG_EKCredentialProfile_v2p4_r3.pdf
│   ├── TCG_PCIe_Component_Class_Registry_v1_r18_pub10272021.pdf
│   ├── TCG_PC_Client_RIM_r1p04_pub.pdf
│   ├── TCG_RIM_Model_v1p01_r0p16_pub.pdf
│   ├── TCG_TNC_TAP_Use_Cases_v1r0p35_published.pdf
│   ├── TNC_TAP_Information_Model_v1.00_r0.36-FINAL.pdf
│   ├── TPM-2p0-Keys-for-Device-Identity-and-Attestation_v1_r12_pub10082021.pdf
│   └── TPM_Keys_for_Platform_Identity_v1_0_r3_Final.pdf
├── Internet of Things(IoT)工作组
│   ├── 375289_TCG_InformationWeek_Webcast_12132011_v4.pdf
│   ├── INFOGRAPHIC-TCG-IoT-FINAL.pdf
│   ├── TCG-Architects-Guide_2018_FC01_web.pdf
│   ├── TCG-Secure-Update-of-SW-and-FW-on-Devices-v1r72_pub.pdf
│   ├── TCG_Guidance_for_Securing_IoT_1_0r21.pdf
│   └── TPM-and-Smart-Buildings.pdf
├── Measurement and Attestation RootS(MARS)工作组
│   ├── MARS_Library_Errata_v1r0_pub.pdf
│   ├── TCG_MARS_Library_Spec_v1r14_pub.pdf
│   └── TCG_UseCases_MARS_v1p0_r27_pub.pdf
├── Mobile 工作组
│   ├── 05_TCG_Mobile_Specs_Guide_2018_web.pdf
│   ├── 2018_TCG_ArchsGuide_PortDevSecTNC_FC01web.pdf
│   ├── MPWG-Selected_Mobile_Phone_Use_Case_Analyses_v1.pdf
│   ├── MPWG-tcg-mobile-reference-architecture-1.pdf
│   ├── Mobile-Command-Response-Buffer-Interface-v2-r12-Specification_FINAL2.pdf
│   ├── Multiple-Stakeholder-Model-v3r40-mobile.pdf
│   ├── Revision_7.02-_29April2010-tcg-mobile-trusted-module-1.0.pdf
│   ├── TCG-Mobile-Trusted-Module-2-0-Use-Cases-v1-0.pdf
│   ├── TCG_MPWG_RIP_r106_published.pdf
│   ├── TCG_TMS_Use_Cases_BYOD_v1r1.pdf
│   ├── TCG_TMS_Use_Cases_Mobile_v2r47.pdf
│   ├── TPM-2-0-Mobile-Reference-Architecture-v2-r142-Specification_FINAL2.pdf
│   ├── TPM-MOBILE-with-Trusted-Execution-Environment-for-Comprehensive-Mobile-Device-Security.pdf
│   ├── TPM_2.0_Mobile_Common_Profile_v2r31_FINAL.pdf
│   ├── Trusted-Network-Communications-for-Mobile-Platforms-r28_pub.pdf
│   ├── tcg-mobile-reference-architecture-normative-requirements-check-list_28May09.pdf
│   └── tcg-mtm-mobile-abstraction-layer-1.0r2.03.pdf
├── Network Equipment 工作组
│   ├── 03_TCG_EstablishingNetEQ_2017_web.pdf
│   ├── Architects-Guide_Securing_Network_Equipment.pdf
│   ├── TCG-on-Securing-Network-Equipment.pdf
│   └── TCG_SNMP_MIB_for_TPM-Based_Attestation_v1p0_r7_pub06jan22.pdf
├── PC Client 工作组
│   ├── EFI-Protocol-Specification-rev13-160330final.pdf
│   ├── PC-Client-Specific-Platform-TPM-Profile-for-TPM-2p0-v1p05p_r14_pub.pdf
│   ├── PC_Client_TPM_PP_1.3_for_TPM_1.2_Level_2_V116.pdf
│   ├── PC_client_FAQ_final_jan_30_2006.pdf
│   ├── Physical-Presence-Interface_1-30_0-52.pdf
│   ├── PhysicalPresenceInterface_FAQ_final_03_2007.pdf
│   ├── TCG-PC-Client-FIM_v1p0_r0p43_pub.pdf
│   ├── TCG-PC-Client-TPM-I2C-Interface-Specification-Errata-v1.0.pdf
│   ├── TCG-TPM-I2C-Interface-Specification-v1.00.pdf
│   ├── TCG_ACPIGeneralSpec_v1p3_r8_pub.pdf
│   ├── TCG_D-RTM_Architecture_v1-0_Published_06172013.pdf
│   ├── TCG_EFI_Platform_1_22_Final_-v15.pdf
│   ├── TCG_FIPS_140_Guidance_for_TPM2_0_v1r1_20170202.pdf
│   ├── TCG_PCClientImplementation_1-21_1_00.pdf
│   ├── TCG_PCClientTPMInterfaceSpecification_TIS__1-3_27_03212013.pdf
│   ├── TCG_PCClient_Device_Driver_Design_Principles_TPM2p0_v1p1_r4_211104_final.pdf
│   ├── TCG_PCClient_PFP_r1p05_v23_pub.pdf
│   ├── TCG_PCClient_PP_1p3_for_Library_1p59_pub_29sept2021.pdf
│   ├── TCG_PCSpecificSpecification_v1_1.pdf
│   └── TCG_PlatformResetAttackMitigationSpecification_1.10_published.pdf
├── Server 工作组

│   ├── EFI-Protocol-Specification-rev13-160330final.pdf
│   ├── Itanium-Architecture-Server-Specification.pdf
│   ├── Mandatory-and-Optional-TPM-Commands.pdf
│   ├── Physical-Presence-Interface_1-30_0-52.pdf
│   ├── Server-Work-Group-Generic-Server-Specification-Frequently-Asked-Qusetions.pdf
│   ├── TCG_1_4_Architecture_Overview.pdf
│   ├── TCG_ACPIGeneralSpec_v1p3_r8_pub.pdf
│   ├── TCG_Generic_Server_Specification_v1_0_rev0_8.pdf
│   └── TCG_ServerManagDomainFWProfile_r1p00_pub.pdf
├── Storage 工作组
│   ├── 03-000216.1.03_CBIHealth.pdf
│   ├── Architects-Guide-Cybersecurity.pdf
│   ├── Architects-Guide-Data-Security-Using-TCG-Self-Encrypting-Drive-Technology.pdf
│   ├── Dave_Anderson_ACSAC_20041207.pdf
│   ├── FAQ_TCG_Storage-Enterprise_Feature_Set-Locking_LBA_Ranges_Control_v1_00_r1_00.pdf
│   ├── INFOGRAPHIC-Save-the-Data-Self-Encrypting-Drives-UPDATE-2020.pdf
│   ├── Opal_SSC_Certification_Test_Cases_v2_01_r1_00.pdf
│   ├── Opal_TestCases_FAQ_final_Feb_04-2_2011.pdf
│   ├── Optical_SSC-100.pdf
│   ├── SANS-Implementing-Hardware-Roots-of-Trust.pdf
│   ├── SNIATechnicalProposal-Security-BCPs-20080904.pdf
│   ├── SSIF_Solutions_Guide_for_Data-at-Rest.pdf
│   ├── SWG-Certification-Progam-Approved-Test-Houses-and-Test-Suites-Ver-1.04_publication.pdf
│   ├── Storage-Interface-Interactions-Specification-FAQ_1_08_Final.pdf
│   ├── Storage-Ruby-SSC-v1.0-Specification-FAQ_20182811_Final.pdf
│   ├── Storage_Certification_Program_Rev_1_22_publication.pdf
│   ├── TCG-Storage-Application-Note-Configurable-Namespace-Locking-Examples-V1-R2_pub-1.pdf
│   ├── TCG-Storage-Feature-Set-Configurable-Locking-for-NVMe-Namespaces-and-SCSI-LUNs-Version-1.02-Revision-1.16_pub-1.pdf
│   ├── TCG-Storage-Opal-SSC-2.02-Changes-From-Opal-SSC-2.01-rev0.03-04122022_FINAL_FAQ_.pdf
│   ├── TCG-Storage-Opal-SSC-v2p02-r1p0_pub24jan2022.pdf
│   ├── TCG_Storage-Core_Spec_Addendum_Secure_Messaging_v1.00_r1.00.pdf
│   ├── TCG_Storage-Enterprise_Feature_Set-Locking_LBA_Ranges_Control_v1_00_r1_00-1.pdf
│   ├── TCG_Storage-Enterprise_Feature_Set_PSK_Secure_Messaging_v1.00_r1.00.pdf
│   ├── TCG_Storage-Feature_Set_Block_SID_Authentication_v1.01_r1.00.pdf
│   ├── TCG_Storage-Feature_Set_ShadowMBR_for_Multiple_Namespaces_v1p00_r1p21_pub.pdf
│   ├── TCG_Storage-Opal_Feature_Set-Additional_DataStore_Tables_v1_00_r1_00_Final.pdf
│   ├── TCG_Storage-Opal_Feature_Set-Configurable_Namespace_Locking-v1.0-FAQs-20181128_Final.pdf
│   ├── TCG_Storage-Opal_Feature_Set_CNL_v1_00_r1_00_pub.pdf
│   ├── TCG_Storage-Opal_Feature_Set_PSID_v1.00_r1.00.pdf
│   ├── TCG_Storage-Opal_Feature_Set_PSK_Secure_Messaging_v1.00_r1.00.pdf
│   ├── TCG_Storage-Opal_Feature_Set_Single_User_Mode_v1.00_r2.00.pdf
│   ├── TCG_Storage-Opalite_SSC_v1.00_r1.00.pdf
│   ├── TCG_Storage-Pyrite_SSC_v2p01_r1p00_pub.pdf
│   ├── TCG_Storage-SSC_Enterprise-v1.01_r1.00.pdf
│   ├── TCG_Storage_Architecture_Core_Spec_v2.01_r1.00.pdf
│   ├── TCG_Storage_Opal_Family_Test_Cases_v1_00_r1_00_pub.pdf
│   ├── TCG_Storage_Opal_SSC_Application_Note_1-00_1-00-Final.pdf
│   ├── TCG_Storage_Protection_Mechanisms_for_Secrets_1-00_1-00_FINAL.pdf
│   ├── TCG_Storage_ReferenceDocument_Opal_Integration_Guidelines_v1.00_r1.00.pdf
│   ├── TCG_Storage_SIIS_v1p10_r1p29_pub_14nov2021.pdf
│   ├── TCG_Storage_SSC_Ruby_v1_r1_pub-1.pdf
│   └── TCGandNVMe_Joint_White_Paper-TCG_Storage_Opal_and_NVMe_FINAL.pdf
├── TPM Software Stack(TSS) 工作组
│   ├── Creating_the_Complete_Trusted_Computing_Ecosystem.pdf
│   ├── TCG_TSS_Marshaling_Unmarshaling_API_v1p0_r07_pub.pdf
│   ├── TCG_TSS_RC_v1p0_r12_pub.pdf
│   ├── TCG_TSS_TCTI_v1p0_r18_pub.pdf
│   ├── TSS_2p0_TAB_ResourceManager_v1p0_r18_04082019_pub.pdf
│   ├── TSS_ESAPI_v1p0_r14_pub10012021.pdf
│   ├── TSS_FAPI_v0p94_r09_pub.pdf
│   ├── TSS_JSON_Policy_v0p7_r08_pub.pdf
│   ├── TSS_Overview_Common_v1_r10_pub09232021.pdf
│   ├── TSS_SAPI_v1p1_r36_pub10012021.pdf
│   └── TSS_Version_1.2_Level_1_FINAL.pdf
├── Trusted Network Communications(TNC) 工作组
│   ├── 04262011_TCG_IW_Combined-Presentation_Final.pdf
│   ├── 2009-RSA-TNC-seminar-afternoon-final.pdf
│   ├── 20StorySnowCastle_RSAC2015.pdf
│   ├── AG_BYOD-Security-Using-TCG-Technology.pdf
│   ├── Architects-Guide-Comply-to-Connect-Using-TNC-Technology.pdf
│   ├── Architects-Guide-Cybersecurity.pdf
│   ├── Controlling-Network-Access-and-Endpoints_Nov2007.pdf
│   ├── CoreIntegrity_Schema_Specification_v2.0.r5.pdf
│   ├── Endpoint-Compliance-Profile-v1r10.pdf
│   ├── Fear-and-Loathing-in-BYOD-Final_Updated.pdf
│   ├── Federated-TNC-FAQ-final-may-8-09.pdf
│   ├── How_to_Use_TPM_Whitepaper_20090302_Final_3_.pdf
│   ├── ICS-Security-Using-TNC-Technology-Architects-Guide.pdf
│   ├── ICSJWG2012-IFMAP-Metadata-for-ICS-Security.pdf
│   ├── IF-TNCCS-SOH_v1.0_r8.pdf
│   ├── IFMAP-for-ICS-Comments.pdf
│   ├── IFM_Segmentation_v1r5_04042016.final_.pdf
│   ├── INFOGRAPHIC-TCG-part-3-1.jpg
│   ├── IWG-IF-PTS_v1.pdf
│   ├── IWG-SimpleObject_Schema_Specification_v1.pdf
│   ├── IWG-Verification_Result_v1_0.pdf
│   ├── IWG_Integrity_Report_Schema_v2.0.r5.pdf
│   ├── IWG_Security_Qualities_Schema_v1_1_r07.pdf
│   ├── Juniper-Networks_Bangchak.pdf
│   ├── Juniper-Networks_City-of-Sudbury_Case-Study.pdf
│   ├── NCP_Juniper_EUSKOM.pdf
│   ├── New-Standards-Lays-the-Foundation-Juniper.pdf
│   ├── Reference_Manifest_Schema_Specification_v2.0.r5.pdf
│   ├── SCAP_Messages_For_IFM_v0_16.pdf
│   ├── SWID_Messages_For_IFM_v1r29.pdf
│   ├── St.-Marys-County.pdf
│   ├── St.-Monicas-College.pdf
│   ├── TCG-Comply-to-Connect-Architects-Guide.pdf
│   ├── TCG-ICS-Spec-for-Network-Segmentation.pdf
│   ├── TCG-Security-Automation-Architects-Guide.pdf
│   ├── TCG-Seminar_RSA-2014-ProgramGuide.pdf
│   ├── TCG-TNC-Architecture-for-Interoperability-Version-2.0-Revision-13-.pdf
│   ├── TCG-Trusted-Network-Communications-Server-Discovery-and-Validation-Version-1.0-Revision-25-1.pdf
│   ├── TCG_1_4_Architecture_Overview.pdf
│   ├── TCG_Guidance_for_Securing_IoT_1_0r21.pdf
│   ├── TCG_TNC_TAP_Use_Cases_v1r0p35_published.pdf
│   ├── TNC-Architecture-Solution-Brief_Final.pdf
│   ├── TNC-Briefing-2013-12-10.pdf
│   ├── TNC-IETF-FAQ.pdf
│   ├── TNC_CESP_v1.0r14.pdf
│   ├── TNC_Federated_TNC_v1.0-r27.pdf
│   ├── TNC_Global-Professional_Services_Firm_Case-Study.pdf
│   ├── TNC_IF-MAP-Overview-04-2009.pdf
│   ├── TNC_IF-MAP_Whitepaper_Sept2010_Final.pdf
│   ├── TNC_IF-PEP-v1.1-rev-0.8.pdf
│   ├── TNC_IF-TNCCS_v1_2_r6.pdf
│   ├── TNC_IFIMC_v1_3_r18.pdf
│   ├── TNC_IFMAP_Metadata_For_Network_Security_v1_1r9.pdf
│   ├── TNC_IFMAP_v2_2r10.pdf
│   ├── TNC_IFM_v1_0_r41-a.pdf
│   ├── TNC_IFT_EAP_v2_0_r5-a2.pdf
│   ├── TNC_IFT_TLS_v2_0_r8.pdf
│   ├── TNC_NAP_white_paper_final_may_18_07.pdf
│   ├── TNC_OpenStandards_April2011.pdf
│   ├── TNC_SCAP_Integration-Whitepaper_09272010.pdf
│   ├── TNC_TAP_Information_Model_v1.00_r0.36-FINAL.pdf
│   ├── Trusted-Network-Communications-for-Mobile-Platforms-r28_pub.pdf
│   ├── iLabs-IF-MAP-white-paper-april-28-08.pdf
│   ├── infoblox-whitepaper-if-map-orchestration-1.pdf
│   ├── trusted-network-communications-faq.pdf
│   └── us-cio-council-byod-toolkit-20120829.pdf
├── Trusted Platform Module(TPM) 工作组
│   ├── 2019_TCG_TPM2_BriefOverview_DR02web.pdf
│   ├── How_to_Use_TPM_Whitepaper_20090302_Final_3_.pdf
│   ├── INFOGRAPHIC-TPM-Part-03_2014-1.jpg
│   ├── PC_Client_TPM_PP_1.3_for_TPM_1.2_Level_2_V116.pdf
│   ├── Physical-Presence-Interface_1-30_0-52.pdf
│   ├── RegistryOfReservedTPM2HandlesAndLocalities_v1p1_pub.pdf
│   ├── SANS-Implementing-Hardware-Roots-of-Trust.pdf
│   ├── SHA1-Impact_V2.0.pdf
│   ├── TCG-Glossary-V1.1-Rev-1.0.pdf
│   ├── TCG-TPM-VendorIDRegistry-v1p06-r0p91-pub.pdf
│   ├── TCG-_Algorithm_Registry_r1p32_pub.pdf
│   ├── TCG_1_4_Architecture_Overview.pdf
│   ├── TCG_Authentication_Webcast_Slides_Final.pdf
│   ├── TCG_PCClient_PP_1p3_for_Library_1p59_pub_29sept2021.pdf
│   ├── TCPA_Main_TCG_Architecture_v1_1b.pdf
│   ├── TPM-Main-Part-3-Commands_v1.2_rev116_01032011.pdf
│   ├── TPM-Overview.pdf
│   ├── TPM2.0-Library-Spec-v1.59-Errata_v1.3_pub.pdf
│   ├── Trusted-Platform-Module-Library-Family-2.0-Level-00-Revision-1.59_pub.zip
│   └── Trusted-Platform-Module-Summary_04292008.pdf
└── Virtualized Platform 工作组
  └── TCG_VPWG_Architecture_V1-0_R0-26_FINAL.pdf

2.Unavailable

这部分是我们目前没有下载到的部分规范。


├──Embedded Systems 工作组

│   ├──TCG Guidance for Securing Resource Constrained Devices
├──Industrial 工作组

│   ├──Industrial Internet Security Framework
├──Internet of Things(IoT) 工作组

│   ├──Webcast: What Embedded and IoT Developers Think About IoT Security: A Look at Survey Data
│   ├──Webcast: What Embedded and IoT Developers Think About IoT Security: A Look at the ECD and TCG Survey
│   ├──Webcast: Securing IoT Endpoints, Networks and the Cloud
│   ├──Webcast: Protecting Intellectual Property in the IoT with Trusted Computing
TCG Technologies for Protecting Internet of Things (IoT) Against Attacks Webcast
├──Measurement and Attestation RootS(MARS) 工作组

│   ├──MARS Emulators
├──Mobile 工作组

│   ├──Securing Mobile Devices on Converged Networks
├──PC Client 工作组

│   ├──PC Client TPM Certification 
├──Storage 工作组

│   ├──Save the Data: A TCG Webcast on How to Protect Data, Wherever It Lives
│   ├──Webcast: Save the Data: How to Protect Data Wherever It Lives
Webcast
│   ├──Stop Data Breaches Now: A Webcast on Self-encrypting Drives for Enterprises
│   ├──Storage Work Group Storage Security Subsystem Class: Opal FAQs
│   ├──Dr. Michael Willett Talks Self-Encrypting Drives During TCG Seminar
│   ├──Storage Work Group Storage Interface Interactions Specification FAQs
│   ├──Data Protection and Security Issues Drive Adoption of Widely Available Self-Encrypting Drives Based on Industry Standards
│   ├──Commonly Asked Questions and Answers on Self-encrypting Drives
│   ├──Where is your Data Tonight? A Lesson in Avoiding Headlines, Fines or Worse
│   ├──Solving the Data Security Dilemma with Self Encrypting Drives
│   ├──TCG Storage Specifications and Key Management
│   ├──Data Protection: Governance, Risk Management, and Compliance
│   ├──Storage Work Group Storage Security Subsystem Class: Enterprise FAQs
├──TPM Software Stack(TSS) 工作组

│   ├──TCG Software Stack Specification (TSS) 1.2 FAQ
├──Trusted Network Communications(TNC) 工作组

│   ├──Industrial Control System (ICS) Security Using TNC Technology Webcast
│   ├──TNC IF-MAP Metadata for ICS Security 1.0 FAQs
│   ├──TCG TNC MAP Content Authorization
│   ├──Open Source IF-MAP Server (omapd)
│   ├──strongSwan Open Source Project
│   ├──RSA Conference 2013 Panel-Network Security, Critical Infrastructure and BYOD
│   ├──TNC@HsH
│   ├──Comments for TNC SCAP Messages for IF-M
│   ├──TNC IF-MAP 2.1 FAQ
│   ├──TNC SCAP Messages for IF-M 1.0 FAQs
│   ├──Commonly Asked Questions and Answers – TNC/InformationWeek Webcast
│   ├──Open Source TNC SDK
│   ├──TNC IF-MAP Interoperability Demonstration
│   ├──TNC Interfaces Enable Dynamic Differentiation
│   ├──Juniper Networks Demonstrates Mobile User/Remote Access
│   ├──Byres Security Demonstrates Industrial Control System (SCADA)
│   ├──Lumeta Demonstrates Pervasive Security with TNC Data Center Management
│   ├──Trusted Network Connect (TNC) Clientless Endpoint Security Profile FAQ
│   ├──Libtnc
│   ├──The Free RADIUS Project
│   ├──Open Platform Trust Service
│   ├──TNC IF-MAP FAQs
│   ├──TCG TNC IF-IMV Specification
├──Trusted Platform Module(TPM) 工作组

│   ├──How to Use the Trusted Platform Module (TPM) for Trust and Security
│   ├──Trusted Platform Module(TPM)===》A Practical Guide to TPM 2.0
│   ├──Trusted Platform Module(TPM)===》TPM / J0.3 User’s Guide
│   ├──Trusted Platform Module(TPM)===》European Multilaterally Secure Computing Base
│   ├──Trusted Platform Module(TPM)===》TPM / J0.3 UserÍs Guide 

二、规范结构概述 1.核心规范 2.扩展规范 3.领域规范 三、总结

本文简要描述了TCG 工作组规范和规范总体结构,后面章节讲对各个工作组规范进行详述,并从规范结构角度对各个规范进行详细解读。

TCG标准规范免费下载

分享知识是一种美德,如果你感觉这篇文章写的还不错,请分享给身边需要的人。
文章内容不足之处,欢迎大家来评论区斧正~
赠人玫瑰,手有余香

下一章 TCG 规范工作组

你是否还在寻找稳定的海外服务器提供商?创新互联www.cdcxhl.cn海外机房具备T级流量清洗系统配攻击溯源,准确流量调度确保服务器高可用性,企业级服务器适合批量采购,新人活动首月15元起,快前往官网查看详情吧


文章题目:第一章TCG标准规范概述-创新互联
分享地址:http://kswsj.cn/article/cegiph.html

其他资讯